支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-9264 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Grafana SQL Expressions allow for remote code execution
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
对生成代码的控制不恰当(代码注入)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Grafana 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Grafana是Grafana开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana存在安全漏洞,该漏洞源于SQL表达式实验性功能在处理用户输入的duckdb查询时,未能充分清理,导致命令注入和本地文件包含漏洞。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
GrafanaGrafana 11.0.0 ~ 11.0.5 -
二、漏洞 CVE-2024-9264 的公开POC
#POC 描述源链接神龙链接
1Exploit for Grafana arbitrary file-read (CVE-2024-9264)https://github.com/nollium/CVE-2024-9264POC详情
2File Read Proof of Concept for CVE-2024-9264https://github.com/z3k0sec/File-Read-CVE-2024-9264POC详情
3Exploit for Grafana arbitrary file-read (CVE-2024-9264)https://github.com/zgimszhd61/CVE-2024-9264POC详情
4Grafana RCE exploit (CVE-2024-9264)https://github.com/z3k0sec/CVE-2024-9264-RCE-ExploitPOC详情
5Nonehttps://github.com/PunitTailor55/Grafana-CVE-2024-9264POC详情
6Nonehttps://github.com/zgimszhd61/CVE-2024-9264-RCEPOC详情
7Nonehttps://github.com/punitdarji/Grafana-CVE-2024-9264POC详情
8The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9264.yamlPOC详情
9Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Grafana%20SQL%20%E8%A1%A8%E8%BE%BE%E5%BC%8F%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-9264.mdPOC详情
10A go implementation for CVE-2024-9264 which effect grafana versions 11.0.x, 11.1.x, and 11.2.x. https://github.com/Cythonic1/CVE-2024-9264POC详情
11Nonehttps://github.com/Exerrdev/CVE-2024-9264-FixedPOC详情
12Nonehttps://github.com/Royall-Researchers/CVE-2024-9264POC详情
13Grafana RCEhttps://github.com/ruizii/CVE-2024-9264POC详情
14Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploithttps://github.com/rvizx/CVE-2024-9264POC详情
15Grafana image with DuckDB binary present vulnerable to exploit CVE-2024-9264https://github.com/patrickpichler/grafana-CVE-2024-9264POC详情
16Grafana SQL Expressions → DuckDB LFI (CVE-2024-9264)https://github.com/amalpvatayam67/day05-grafana-sqlexpr-labPOC详情
17https://github.com/vulhub/vulhub/blob/master/grafana/CVE-2024-9264/README.mdPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-9264 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2024-9264 的评论

暂无评论


发表评论