Fanatastic 🔹
Enumeration
We have a Prometheus
+ Grafana
stack.
Initial Access
Searching for exploits, we have a path traversal one.
We can read the grafana
database and get data source credentials from /var/lib/grafana/grafana.db
.
Searching for an exploit to decrypt it, we have https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798
SSH with credentials.
Privilege Escalation
The user belongs to the disk
group, so we can read root files.
We can read the root private key and SSH to the host.
Post Exploitation
Get the flags.