Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-9264
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grafana SQL Expressions allow for remote code execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana是Grafana开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana存在安全漏洞,该漏洞源于SQL表达式实验性功能在处理用户输入的duckdb查询时,未能充分清理,导致命令注入和本地文件包含漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
GrafanaGrafana 11.0.0 ~ 11.0.5 -
II. Public POCs for CVE-2024-9264
#POC DescriptionSource LinkShenlong Link
1Exploit for Grafana arbitrary file-read (CVE-2024-9264)https://github.com/nollium/CVE-2024-9264POC Details
2File Read Proof of Concept for CVE-2024-9264https://github.com/z3k0sec/File-Read-CVE-2024-9264POC Details
3Exploit for Grafana arbitrary file-read (CVE-2024-9264)https://github.com/zgimszhd61/CVE-2024-9264POC Details
4Grafana RCE exploit (CVE-2024-9264)https://github.com/z3k0sec/CVE-2024-9264-RCE-ExploitPOC Details
5Nonehttps://github.com/PunitTailor55/Grafana-CVE-2024-9264POC Details
6Nonehttps://github.com/zgimszhd61/CVE-2024-9264-RCEPOC Details
7Nonehttps://github.com/punitdarji/Grafana-CVE-2024-9264POC Details
8The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9264.yamlPOC Details
9Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Grafana%20SQL%20%E8%A1%A8%E8%BE%BE%E5%BC%8F%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-9264.mdPOC Details
10A go implementation for CVE-2024-9264 which effect grafana versions 11.0.x, 11.1.x, and 11.2.x. https://github.com/Cythonic1/CVE-2024-9264POC Details
11Nonehttps://github.com/Exerrdev/CVE-2024-9264-FixedPOC Details
12Nonehttps://github.com/Royall-Researchers/CVE-2024-9264POC Details
13Grafana RCEhttps://github.com/ruizii/CVE-2024-9264POC Details
14Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploithttps://github.com/rvizx/CVE-2024-9264POC Details
15Grafana image with DuckDB binary present vulnerable to exploit CVE-2024-9264https://github.com/patrickpichler/grafana-CVE-2024-9264POC Details
16Grafana SQL Expressions → DuckDB LFI (CVE-2024-9264)https://github.com/amalpvatayam67/day05-grafana-sqlexpr-labPOC Details
17https://github.com/vulhub/vulhub/blob/master/grafana/CVE-2024-9264/README.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-9264
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-9264

No comments yet


Leave a comment