CVE Series: Grafana Directory Traversal (CVE-2021-43798)

Cybrary
Course

The Grafana Directory Traversal vulnerability (CVE-2021-43798) is a critical arbitrary file reading vulnerability impacting global Grafana servers and has been exploited in the wild. Take this course to learn how to exploit and mitigate this vulnerability!

Time
1 hour 5 minutes
Difficulty
Intermediate
CEU/CPE
1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: Exploit and Mitigate the Grafana Directory Traversal Vulnerability
Introduction and Background
10m
Vulnerability Identification
10m
CVE Exploitation
30m
CVE Mitigation
15m
Course Description

Who should take this course?

This course is for seasoned red teamers, penetration testers, security and vulnerability assessment analysts, and system administrators who want to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.

Why take this course?

The Grafana Directory Traversal vulnerability (CVE-2021-43798) is a critical flaw impacting Grafana servers across the globe and has been known to be exploited in the wild.

On December 2nd, 2021, a security researcher named Jordy Versmissen, who goes by the twitter handle j0v0x0, shared in a now-deleted tweet that they had discovered an arbitrary file reading vulnerability in Grafana servers. This flaw, now known as CVE-2021-43798, has a high CVSS score of 7.5 out of 10.0 due to the remote attack vector, low attack complexity, no privilege requirement, and no user interaction required. It is important that you know how to exploit and mitigate this easily exploitable and dangerous vulnerability.

What makes this course different from other courses on similar topics?

After completing this course, you will be able to:

  • Define the attack, describe its root cause, and communicate its significance to key organizational stakeholders.

  • Exploit this vulnerability using publicly available exploit code.

  • Execute various mitigation tactics to reduce risk.

This course is taught by Raymond Evans, a member of the CyDefe team. CyDefe develops and operates capture-the-flag (CTF) style environments, and this course focuses on presenting learners with virtual labs where you can dirctly apply what you've learned.

Why should I take this course on Cybrary and not somewhere else?

This on-demand course gives you the hands-on experience needed to protect and defend your organization against the critical vulnerability. In one hour, offensive and defensive security professionals can become more prepared to defend their organization against this flaw that could allow an adversary to cause significant damage on a victim system. In this course, you will see just how quick and easy it is to exploit this vulnerability from the perspective of an adversary. You will be able to not only exploit and mitigate this critical vulnerability, but also describe its significance to organizational stakeholders.