The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
References
Link | Resource |
---|---|
https://grafana.com/security/security-advisories/cve-2024-9264/ | Vendor Advisory |
Configurations
History
01 Nov 2024, 18:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://grafana.com/security/security-advisories/cve-2024-9264/ - Vendor Advisory | |
CPE | cpe:2.3:a:grafana:grafana:11.0.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Grafana grafana
Grafana |
|
CWE | CWE-77 |
18 Oct 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-18 04:15
Updated : 2024-11-01 18:14
NVD link : CVE-2024-9264
Mitre link : CVE-2024-9264
CVE.ORG link : CVE-2024-9264
JSON object : View
Products Affected
grafana
- grafana