First published: Fri Oct 18 2024(Updated: )
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Credit: security@grafana.com security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/grafana/grafana | >=11.2.0<=11.2.2 | 11.2.2+security-01 |
go/github.com/grafana/grafana | >=11.1.0<=11.1.7 | 11.1.7+security-01 |
go/github.com/grafana/grafana | >=11.0.0<=11.0.6 | 11.0.6+security-01 |
Grafana Labs Grafana OSS and Enterprise | =11.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9264 has a medium severity rating due to its potential for command injection and local file inclusion.
To fix CVE-2024-9264, upgrade to Grafana versions 11.2.2+security-01, 11.1.7+security-01, or 11.0.6+security-01.
CVE-2024-9264 affects Grafana versions 11.0.0 to 11.2.2, including all versions within these ranges.
CVE-2024-9264 can lead to command injection and local file inclusion attacks due to insufficient input sanitization.
Any user with access to the SQL Expressions feature in the affected versions of Grafana is at risk from CVE-2024-9264.