Grafana Final Scanner is a security assessment tool designed for comprehensive vulnerability detection in Grafana deployments.
- 10 CVE Vulnerability Checks - Comprehensive coverage from 2018-2025
- Smart Version Detection - Multi-endpoint fingerprinting with fallback strategies
pip install requests urllib3
git clone https://github.com/Zierax/Grafana-Final-Scanner.git
chmod +x scanner.py
python scanner.py -u https://grafana.example.com# Single target
python scanner.py -u https://grafana.example.com
# Batch scan
python scanner.py -f targets.txt -o report.json
# Verbose mode
python scanner.py -u https://grafana.example.com -v
# Self-signed SSL
python scanner.py -u https://internal.grafana.local --no-ssl-verify-u, --url Single target URL
-f, --file File with target URLs (one per line)
-o, --output Save JSON report to file
-t, --timeout HTTP timeout in seconds (default: 10)
--no-ssl-verify Disable SSL certificate verification
-v, --verbose Enable detailed logging
| CVE | CVSS | Description | Affected Versions |
|---|---|---|---|
| CVE-2025-4123 | 8.2 | Path Traversal & Open Redirect XSS | < 12.0.0+security-01 |
| CVE-2024-9264 | 9.0+ | DuckDB SQL Injection (RCE) | 11.0.0-11.2.1 |
| CVE-2021-43798 | 7.5 | Directory Traversal (File Read) | 8.0.0-8.3.0 |
| CVE | CVSS | Description | Affected Versions |
|---|---|---|---|
| CVE-2018-15727 | 8.1 | Auth Bypass (Cookie Forging) | 2.x-5.2.2 |
| CVE-2021-27358 | 7.5 | DoS via Snapshots API | 6.7.3-7.4.1 |
- CVE-2021-39226 - Snapshot Enumeration
- CVE-2020-11110 - Stored XSS
- CVE-2021-41174 - AngularJS XSS
- CVE-2022-32275/32276 - v8.4.3 Specific Issues
╔══════════════════════════════════════════════════════════════════════╗
║ TARGET ASSESSMENT ║
║ https://grafana.example.com ║
╚══════════════════════════════════════════════════════════════════════╝
ℹ [INFO] Phase 1: Connectivity Verification
✓ [OK] Target reachable (HTTP 200)
ℹ [INFO] Phase 2: Version Fingerprinting
✓ [OK] Version detected: Grafana v8.2.5
ℹ [INFO] Phase 3: Vulnerability Scanning
🔴 [CRITICAL] CVE-2021-43798 Directory Traversal
└─ Directory traversal CONFIRMED - /etc/passwd readable
└─ Test URL: https://grafana.example.com/public/plugins/alertlist/../../../../etc/passwd
╔══════════════════════════════════════════════════════════════════════╗
║ ASSESSMENT SUMMARY ║
╚══════════════════════════════════════════════════════════════════════╝
Targets Scanned: 1
Vulnerable Targets: 1
Secure Targets: 0
Vulnerability Distribution:
🔴 CRITICAL 1
✓ HIGH 0
✓ MEDIUM 0
✓ LOW 0
- Connectivity Verification - TCP/HTTP handshake and SSL validation
- Version Fingerprinting - Multi-source detection from 4+ endpoints
- Vulnerability Assessment - Version-aware CVE testing with strict validation
- Configuration Analysis - Security posture evaluation
- Version-Based Filtering: Skip inapplicable CVE checks (~40% reduction)
- Content Validation: Require specific indicators, not just HTTP status (~60% reduction)
- Multi-Vector Testing: Test multiple variants for confirmation
Contributions welcome! Submit pull requests with:
- New CVE detection modules
- False positive fixes
- Documentation improvements
- Test cases