Fanatastic 🔹
Enumeration
We have a prometheus + grafana stack
Initial Access
Searching for exploit we have a path traversal one
We can read grafana db and get data source credentials from /var/lib/grafana/grafana.db
Searching for an exploit to decrypt it we have https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798
SSH with credentials
Privilege Escalation
The user belongs to disk group so we can read root files.
We can read root private key and ssh to the host.
Post Exploitation
Get the flags