尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Exploit for Grafana arbitrary file-read (CVE-2024-9264) | https://github.com/nollium/CVE-2024-9264 | POC详情 |
| 2 | File Read Proof of Concept for CVE-2024-9264 | https://github.com/z3k0sec/File-Read-CVE-2024-9264 | POC详情 |
| 3 | Exploit for Grafana arbitrary file-read (CVE-2024-9264) | https://github.com/zgimszhd61/CVE-2024-9264 | POC详情 |
| 4 | Grafana RCE exploit (CVE-2024-9264) | https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit | POC详情 |
| 5 | None | https://github.com/PunitTailor55/Grafana-CVE-2024-9264 | POC详情 |
| 6 | None | https://github.com/zgimszhd61/CVE-2024-9264-RCE | POC详情 |
| 7 | None | https://github.com/punitdarji/Grafana-CVE-2024-9264 | POC详情 |
| 8 | The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9264.yaml | POC详情 |
| 9 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Grafana%20SQL%20%E8%A1%A8%E8%BE%BE%E5%BC%8F%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-9264.md | POC详情 |
| 10 | A go implementation for CVE-2024-9264 which effect grafana versions 11.0.x, 11.1.x, and 11.2.x. | https://github.com/Cythonic1/CVE-2024-9264 | POC详情 |
| 11 | None | https://github.com/Exerrdev/CVE-2024-9264-Fixed | POC详情 |
| 12 | None | https://github.com/Royall-Researchers/CVE-2024-9264 | POC详情 |
| 13 | Grafana RCE | https://github.com/ruizii/CVE-2024-9264 | POC详情 |
| 14 | Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit | https://github.com/rvizx/CVE-2024-9264 | POC详情 |
| 15 | Grafana image with DuckDB binary present vulnerable to exploit CVE-2024-9264 | https://github.com/patrickpichler/grafana-CVE-2024-9264 | POC详情 |
| 16 | Grafana SQL Expressions → DuckDB LFI (CVE-2024-9264) | https://github.com/amalpvatayam67/day05-grafana-sqlexpr-lab | POC详情 |
| 17 | https://github.com/vulhub/vulhub/blob/master/grafana/CVE-2024-9264/README.md | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论