cscli scenarios install crowdsecurity/grafana-cve-2021-43798
Detect exploitation of CVE-2021-43798
1type: trigger2format: 2.03name: crowdsecurity/grafana-cve-2021-437984description: "Grafana - Arbitrary File Read (CVE-2021-43798)"5filter: |6 evt.Meta.log_type in ["http_access-log", "http_error-log"] and7 (Upper(evt.Meta.http_path) matches '/PUBLIC/PLUGINS/[^/]+/../[./]+/'8 or9 Upper(evt.Meta.http_path) matches '/PUBLIC/PLUGINS/[^/]+/%2E%2E/[%2E/]+/')10groupby: "evt.Meta.source_ip"11blackhole: 2m12labels:13 service: grafana14 confidence: 315 spoofable: 016 classification:17 - attack.T119018 - attack.T159519 - cve.CVE-2021-4379820 behavior: "http:exploit"21 label: "Grafana - LFI"22 remediation: true23