The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
History

Fri, 01 Nov 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:grafana:grafana:11.0.0:*:*:*:*:*:*:*

Thu, 24 Oct 2024 13:45:00 +0000


Fri, 18 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Grafana
Grafana grafana
CPEs cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
Vendors & Products Grafana
Grafana grafana
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 03:30:00 +0000

Type Values Removed Values Added
Description The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Title Grafana SQL Expressions allow for remote code execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published: 2024-10-18T03:20:52.489Z

Updated: 2024-11-01T03:55:21.947Z

Reserved: 2024-09-26T20:15:46.544Z

Link: CVE-2024-9264

cve-icon Vulnrichment

Updated: 2024-10-18T14:24:33.583Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-18T04:15:04.723

Modified: 2024-11-01T18:14:31.377

Link: CVE-2024-9264

cve-icon Redhat

Severity : Critical

Publid Date: 2024-10-24T05:04:52Z

Links: CVE-2024-9264 - Bugzilla