SANS 2024 年威胁狩猎调查报告
第九年的威胁狩猎调查报告,对于了解威胁狩猎的发展趋势和接受程度很有帮助。
The open-source platform for monitoring and observability
to exploit this sql injection vulnerability, someone must use a valid account login to the grafana web backend, then send malicious POST request to /api/ds/query “rawSql” entry.
if attackers login to the grafana web backend, they can use a post request to /api/ds/query api, then they can modify the “rawSql” filed to execute Malicious sql strings leading to time-based blind sql injection vulnerability, then leak data from databases.