Grafana SQL Expressions Enables DuckDB Command Injection
CVE-2024-9264 Published on October 18, 2024
Grafana SQL Expressions allow for remote code execution
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Vulnerability Analysis
CVE-2024-9264 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. Public availability of a proof of concept (POC) exploit exists for CVE-2024-9264. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
What is a Code Injection Vulnerability?
The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CVE-2024-9264 has been classified to as a Code Injection vulnerability or weakness.
Products Associated with CVE-2024-9264
Want to know whenever a new CVE is published for Grafana Labs Grafana? stack.watch will email you.
Affected Versions
Grafana:- Version 11.0.0 and below 11.0.5 is affected.
- Version 11.1.0 and below 11.1.6 is affected.
- Version 11.2.0 and below 11.2.1 is affected.
- Version 11.0.0 and below 11.0.6 is affected.
- Version 11.1.0 and below 11.1.7 is affected.
- Version 11.2.0 and below 11.2.2 is affected.
- Version 11.0.0 and below 11.0.5\+security-01 is affected.
- Version 11.0.6 and below 11.0.6\+security-01 is affected.
- Version 11.1.0 and below 11.1.6\+security-01 is affected.
- Version 11.1.7 and below 11.1.7\+security-01 is affected.
- Version 11.2.0 and below 11.2.1\+security-01 is affected.
- Version 11.2.2 and below 11.2.2\+security-01 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.