Skip to content

Fanatastic 🔹

Enumeration

We have a Prometheus + Grafana stack.

Initial Access

Searching for exploits, we have a path traversal one.

We can read the grafana database and get data source credentials from /var/lib/grafana/grafana.db.

Searching for an exploit to decrypt it, we have https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798

SSH with credentials.

Privilege Escalation

The user belongs to the disk group, so we can read root files.

We can read the root private key and SSH to the host.

Post Exploitation

Get the flags.