The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
History

Fri, 14 Mar 2025 10:45:00 +0000

Type Values Removed Values Added
References

Fri, 01 Nov 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:grafana:grafana:11.0.0:*:*:*:*:*:*:*

Thu, 24 Oct 2024 13:45:00 +0000


Fri, 18 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Grafana
Grafana grafana
CPEs cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
Vendors & Products Grafana
Grafana grafana
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 03:30:00 +0000

Type Values Removed Values Added
Description The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Title Grafana SQL Expressions allow for remote code execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published:

Updated: 2025-03-14T10:03:06.561Z

Reserved: 2024-09-26T20:15:46.544Z

Link: CVE-2024-9264

cve-icon Vulnrichment

Updated: 2025-03-14T10:03:06.561Z

cve-icon NVD

Status : Modified

Published: 2024-10-18T04:15:04.723

Modified: 2025-03-14T10:15:15.513

Link: CVE-2024-9264

cve-icon Redhat

Severity : Critical

Publid Date: 2024-10-24T05:04:52Z

Links: CVE-2024-9264 - Bugzilla