Skip to content

Zierax/Grafana-Final-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GRAFANA FINAL SCANNER v1.0


Executive Summary

Grafana Final Scanner is a security assessment tool designed for comprehensive vulnerability detection in Grafana deployments.


Key Features

Core Capabilities

  • 10 CVE Vulnerability Checks - Comprehensive coverage from 2018-2025
  • Smart Version Detection - Multi-endpoint fingerprinting with fallback strategies

Installation

Quick Start

pip install requests urllib3
git clone https://github.com/Zierax/Grafana-Final-Scanner.git
chmod +x scanner.py
python scanner.py -u https://grafana.example.com

Usage

Basic Commands

# Single target
python scanner.py -u https://grafana.example.com

# Batch scan
python scanner.py -f targets.txt -o report.json

# Verbose mode
python scanner.py -u https://grafana.example.com -v

# Self-signed SSL
python scanner.py -u https://internal.grafana.local --no-ssl-verify

Command-Line Options

-u, --url           Single target URL
-f, --file          File with target URLs (one per line)
-o, --output        Save JSON report to file
-t, --timeout       HTTP timeout in seconds (default: 10)
--no-ssl-verify     Disable SSL certificate verification
-v, --verbose       Enable detailed logging

Vulnerability Database (Could be updated in future)

Critical Severity

CVE CVSS Description Affected Versions
CVE-2025-4123 8.2 Path Traversal & Open Redirect XSS < 12.0.0+security-01
CVE-2024-9264 9.0+ DuckDB SQL Injection (RCE) 11.0.0-11.2.1
CVE-2021-43798 7.5 Directory Traversal (File Read) 8.0.0-8.3.0

High Severity

CVE CVSS Description Affected Versions
CVE-2018-15727 8.1 Auth Bypass (Cookie Forging) 2.x-5.2.2
CVE-2021-27358 7.5 DoS via Snapshots API 6.7.3-7.4.1

Medium/Low Severity

  • CVE-2021-39226 - Snapshot Enumeration
  • CVE-2020-11110 - Stored XSS
  • CVE-2021-41174 - AngularJS XSS
  • CVE-2022-32275/32276 - v8.4.3 Specific Issues

Sample Output

╔══════════════════════════════════════════════════════════════════════╗
║ TARGET ASSESSMENT                                                    ║
║ https://grafana.example.com                                          ║
╚══════════════════════════════════════════════════════════════════════╝

ℹ [INFO] Phase 1: Connectivity Verification
  ✓ [OK] Target reachable (HTTP 200)

ℹ [INFO] Phase 2: Version Fingerprinting
  ✓ [OK] Version detected: Grafana v8.2.5

ℹ [INFO] Phase 3: Vulnerability Scanning

  🔴 [CRITICAL] CVE-2021-43798    Directory Traversal
     └─ Directory traversal CONFIRMED - /etc/passwd readable
     └─ Test URL: https://grafana.example.com/public/plugins/alertlist/../../../../etc/passwd

╔══════════════════════════════════════════════════════════════════════╗
║ ASSESSMENT SUMMARY                                                   ║
╚══════════════════════════════════════════════════════════════════════╝

Targets Scanned:      1
Vulnerable Targets:   1
Secure Targets:       0

Vulnerability Distribution:
  🔴 CRITICAL      1
  ✓ HIGH          0
  ✓ MEDIUM        0
  ✓ LOW           0

Technical Methodology

Scanning Process

  1. Connectivity Verification - TCP/HTTP handshake and SSL validation
  2. Version Fingerprinting - Multi-source detection from 4+ endpoints
  3. Vulnerability Assessment - Version-aware CVE testing with strict validation
  4. Configuration Analysis - Security posture evaluation

False Positive Reduction

  • Version-Based Filtering: Skip inapplicable CVE checks (~40% reduction)
  • Content Validation: Require specific indicators, not just HTTP status (~60% reduction)
  • Multi-Vector Testing: Test multiple variants for confirmation

Contributing

Contributions welcome! Submit pull requests with:

  • New CVE detection modules
  • False positive fixes
  • Documentation improvements
  • Test cases

About

Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages