Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for Grafana arbitrary file-read (CVE-2024-9264) | https://github.com/nollium/CVE-2024-9264 | POC Details |
| 2 | File Read Proof of Concept for CVE-2024-9264 | https://github.com/z3k0sec/File-Read-CVE-2024-9264 | POC Details |
| 3 | Exploit for Grafana arbitrary file-read (CVE-2024-9264) | https://github.com/zgimszhd61/CVE-2024-9264 | POC Details |
| 4 | Grafana RCE exploit (CVE-2024-9264) | https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit | POC Details |
| 5 | None | https://github.com/PunitTailor55/Grafana-CVE-2024-9264 | POC Details |
| 6 | None | https://github.com/zgimszhd61/CVE-2024-9264-RCE | POC Details |
| 7 | None | https://github.com/punitdarji/Grafana-CVE-2024-9264 | POC Details |
| 8 | The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9264.yaml | POC Details |
| 9 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Grafana%20SQL%20%E8%A1%A8%E8%BE%BE%E5%BC%8F%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-9264.md | POC Details |
| 10 | A go implementation for CVE-2024-9264 which effect grafana versions 11.0.x, 11.1.x, and 11.2.x. | https://github.com/Cythonic1/CVE-2024-9264 | POC Details |
| 11 | None | https://github.com/Exerrdev/CVE-2024-9264-Fixed | POC Details |
| 12 | None | https://github.com/Royall-Researchers/CVE-2024-9264 | POC Details |
| 13 | Grafana RCE | https://github.com/ruizii/CVE-2024-9264 | POC Details |
| 14 | Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit | https://github.com/rvizx/CVE-2024-9264 | POC Details |
| 15 | Grafana image with DuckDB binary present vulnerable to exploit CVE-2024-9264 | https://github.com/patrickpichler/grafana-CVE-2024-9264 | POC Details |
| 16 | Grafana SQL Expressions → DuckDB LFI (CVE-2024-9264) | https://github.com/amalpvatayam67/day05-grafana-sqlexpr-lab | POC Details |
| 17 | https://github.com/vulhub/vulhub/blob/master/grafana/CVE-2024-9264/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet