ALERT: ET EXPLOIT Grafana 8.x Path Traversal (CVE-2021-43798) 82 Timestamp 2023-06-07T14:21:22.266209+0000 Sensor suricata Protocol TCP Source 172.16.1.23:34770 Destination 10.0.1.4:445 In Interface eno2 Flow ID 997920879570354 Signature ET EXPLOIT Grafana 8.x Path Traversal (CVE-2021-43798) Category Attempted Administrator Privilege Gain Signature ID 1: 2034629 :2 Severity 1 History 2023-06-07 22:26:19 - Archived by anonymous HTTP Hostname: 10.0.1.4 Http Method: GET Http Port: 445 Http User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 Length: 0 Protocol: HTTP/1.1 Url: /public/plugins/welcome/../../../../../../../../../etc/passwd User Agent.Device: Mac User Agent.Major: 12 User Agent.Minor: 0 User Agent.Name: Safari User Agent.Os: Mac OS X User Agent.Os Full: Mac OS X 10.14.3 User Agent.Os Major: 10 User Agent.Os Minor: 14 User Agent.Os Name: Mac OS X User Agent.Os Patch: 3 User Agent.Os Version: 10.14.3 User Agent.Patch: 3 User Agent.Version: 12.0.3 Payload GET /public/plugins/welcome/../../../../../../../../../etc/passwd HTTP/1.1..Host: 10.0.1.4:445..User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15..Accept-Encoding: gzip....
时间: 2024-01-27 09:03:58 浏览: 190
CVE-2021-26855.doc
It looks like you have provided a log of a security event that alerts of a potential exploit of CVE-2021-43798, which is a path traversal vulnerability found in Grafana 8.x. The log shows that there was an attempted administrator privilege gain on the destination IP address 10.0.1.4 from the source IP address 172.16.1.23. The HTTP request was a GET method to the URL "/public/plugins/welcome/../../../../../../../../../etc/passwd" which is an attempt to access the system's password file. The user agent in the request shows that it was made using Safari on a Mac OS X machine. It is important to investigate and mitigate this security event to prevent any potential damage to the system.
阅读全文