Grafana Releases Patch To Fix Zero-day Vulnerability

Grafana has released an emergency update to fix a zero-day vulnerability that is being tracked as CVE-2021-43798.

While this addition to previous patches was released to fix the issue, it became necessary after exploits were circulated over Twitter.

Since Proof-of-concept on how to exploit the vulnerability was publicly available Grafana was forced to release a fix. CEV-2021-43798 received a severity of 7.5 and can still be exploited on on-premise servers that have yet to be updated.

CEV-2021-43798 is described as a path traversal flaw that could allow attackers to navigate outside the Grafana folder and go ahead to remotely access restricted locations on the server.

In its explanation, Grafana explained that the root cause of the problem lies in the URL provided for installed plug-ins. According to Grafana, the URL was vulnerable to path traversal attacks. Currently, thousands of Grafana servers are exposed to this attack. Those who cannot install the update should ensure that their servers are not accessible from the public web.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web