First published: Fri Oct 18 2024(Updated: )
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Credit: security@grafana.com security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/grafana/grafana | >=11.2.0<=11.2.2 | 11.2.2+security-01 |
go/github.com/grafana/grafana | >=11.1.0<=11.1.7 | 11.1.7+security-01 |
go/github.com/grafana/grafana | >=11.0.0<=11.0.6 | 11.0.6+security-01 |
Grafana Grafana | =11.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.