The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
References
Link | Resource |
---|---|
https://grafana.com/security/security-advisories/cve-2024-9264/ | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20250314-0007/ |
Configurations
History
14 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2024-10-18 04:15
Updated : 2025-03-14 10:15
NVD link : CVE-2024-9264
Mitre link : CVE-2024-9264
CVE.ORG link : CVE-2024-9264
JSON object : View
Products Affected
grafana
- grafana