Grafana Releases Patch To Fix Zero-day Vulnerability

December 8, 2021

Grafana has released an emergency update to fix a zero-day vulnerability that is being tracked as CVE-2021-43798.

While this addition to previous patches was released to fix the issue, it became necessary after exploits were circulated over Twitter.

Since Proof-of-concept on how to exploit the vulnerability was publicly available Grafana was forced to release a fix. CEV-2021-43798 received a severity of 7.5 and can still be exploited on on-premise servers that have yet to be updated.

CEV-2021-43798 is described as a path traversal flaw that could allow attackers to navigate outside the Grafana folder and go ahead to remotely access restricted locations on the server.

In its explanation, Grafana explained that the root cause of the problem lies in the URL provided for installed plug-ins. According to Grafana, the URL was vulnerable to path traversal attacks. Currently, thousands of Grafana servers are exposed to this attack. Those who cannot install the update should ensure that their servers are not accessible from the public web.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

June 24, 2025 A new report from Okta shows that despite growing fears about identity theft, most more...

June 23, 2025 Canada’s cybersecurity agency and the U.S. Federal Bureau of Investigation have confirmed that a more...

June 12, 2025 A new vulnerability discovered in Microsoft Copilot has raised urgent concerns about the security more...

May 6, 2025 A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by more...

Jim Love

Jim is and author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn