Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-9264Code Injection in Grafana

Severity
9.4CRITICALNVD
EPSS
93.8%
top 0.14%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 18
Latest updateOct 28

Description

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Packages3 packages

CVEListV5grafana/grafana11.0.011.0.5+5
Gogithub.com/grafana_grafana11.0.011.0.6+security-01+2
NVDgrafana/grafana11.0.0

🔴Vulnerability Details

5
OSV
Grafana Command Injection And Local File Inclusion Via Sql Expressions in github.com/grafana/grafana2024-10-28
OSV
CVE-2024-9264: The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input2024-10-18
GHSA
Grafana Command Injection And Local File Inclusion Via Sql Expressions2024-10-18
OSV
Grafana Command Injection And Local File Inclusion Via Sql Expressions2024-10-18
CVEList
Grafana SQL Expressions allow for remote code execution2024-10-18

💥Exploits & PoCs

1
Nuclei
Grafana Post-Auth DuckDB - SQL Injection To File Read

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Grafana Post-Authentication DuckDB SQL Injection (CVE-2024-9264)2024-10-22

📋Vendor Advisories

1
Red Hat
grafana: Command injection and local file inclusion via SQL Expressions2024-10-24
CVE-2024-9264 — Code Injection in Grafana | cvebase