CVE-2024-9264

Published Oct 18, 2024

Last updated 16 days ago

Overview

Description
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Source
security@grafana.com
NVD status
Analyzed

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

nvd@nist.gov
CWE-77
security@grafana.com
CWE-94

Social media

Hype score
Not currently trending
  1. 【漏洞】Grafana 任意文件读取漏洞 (CVE-2024-9264) 此 PoC 演示了 CVE-2024-9264 的利用,该漏洞使用经过身份验证的用户执行 DuckDB SQL 查询并读取文件系统上的任意文件。 https://t.co/mroOWSkF6p

    @cybersecuritysl

    6 Nov 2024

    1638 Impressions

    6 Retweets

    20 Likes

    22 Bookmarks

    0 Replies

    0 Quotes

  2. Grafana の脆弱性 CVE-2024-9264 (CVSS 9.9):PoC エクスプロイトが公開 https://t.co/rtnKmsCGpX #DuckDB #Exploit #Grafana #LFI #OpenSource #PoCExploit #RCE

    @iototsecnews

    6 Nov 2024

    75 Impressions

    2 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🔒 Critical Grafana vulnerability (CVE-2024-9264) rated 9.9/10! PoC shows risks of LFI & command injection with viewer access. Update your versions ASAP to stay secure. #CyberSecurity #Grafana #Infosec https://t.co/xISTl7NQEe

    @SandroBruscino

    3 Nov 2024

    151 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Top 5 Trending CVEs: 1 - CVE-2024-35202 2 - CVE-2024-38821 3 - CVE-2024-51378 4 - CVE-2024-50550 5 - CVE-2024-9264 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    3 Nov 2024

    125 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  5. ''Grafana Vulnerability CVE-2024-9264: PoC Exploit Released for 9.9-Rated Critical Flaw'' #infosec #pentest #redteam #blueteam https://t.co/RyQaw29P2S

    @CyberWarship

    2 Nov 2024

    2680 Impressions

    16 Retweets

    27 Likes

    14 Bookmarks

    0 Replies

    0 Quotes

  6. CVE-2024-9264 | Grafana RCE via SQL Expressions (Critical) https://t.co/7yWrDTcX66 #CVEs #Bug Bounty #OSINT #Recon #Vapt #Web #bugbountytip #infosecurity #infosec #CyberSecurity #informationtechnology

    @Yashh2

    2 Nov 2024

    56 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  7. Actively exploited CVE : CVE-2024-9264

    @transilienceai

    30 Oct 2024

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Actively exploited CVE : CVE-2024-9264

    @transilienceai

    29 Oct 2024

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. Grafana の RCE 脆弱性 CVE-2024-9264 (CVSS:9.9) が FIX:直ちにアップデートを! https://t.co/eerJ9qyW71 #API #DuckDB #Grafana #Monitoring #OpenSource #SecTool #SQL #SQLExpressionsapi

    @iototsecnews

    29 Oct 2024

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Grafanaの重大(Critical)な脆弱性CVE-2024-9264に対応するPoC(攻撃の概念実証コード)が公開。CVE-2024-9264はCVSSスコア9.9のローカルファイルインクルージョン(LFI)で、最終的にコマンドインジェクションによる遠隔コード実行が可能。脆弱なのは実験的機能だが既定で有効。 https://t.co/zu6LScghDp

    @__kokumoto

    28 Oct 2024

    1731 Impressions

    8 Retweets

    15 Likes

    3 Bookmarks

    1 Reply

    0 Quotes

  11. 🚨 Grafana Vulnerability Alert: CVE-2024-9264 - Proof of concept released🚨 A critical flaw (CVE-2024-9264) in Grafana, rated 9.9 in severity, allows attackers to execute remote code and potentially compromise systems. A proof-of-concept exploit has been released.… https://t.co/

    @Ransom_DB

    28 Oct 2024

    73 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    1 Quote

  12. Grafana Vulnerability CVE-2024-9264: PoC Exploit Released for 9.9-Rated Critical Flaw https://t.co/0JsbakKIoD

    @Dinosn

    28 Oct 2024

    6854 Impressions

    38 Retweets

    112 Likes

    49 Bookmarks

    0 Replies

    3 Quotes

  13. 🗣 Grafana Vulnerability CVE-2024-9264: PoC Exploit Released for 9.9-Rated Critical Flaw https://t.co/KBLYVGagXf

    @fridaysecurity

    28 Oct 2024

    68 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    1 Quote

  14. Grafana Vulnerability CVE-2024-9264: PoC Exploit Released for 9.9-Rated Critical Flaw Explore the technical details of CVE-2024-9264, a critical vulnerability in #Grafana that allows attackers to exploit #SQL expressions feature. https://t.co/Y2rKvXcphW

    @the_yellow_fall

    28 Oct 2024

    2871 Impressions

    16 Retweets

    42 Likes

    14 Bookmarks

    0 Replies

    1 Quote

  15. Top 5 Trending CVEs: 1 - CVE-2024-47575 2 - CVE-2024-4947 3 - CVE-2023-26360 4 - CVE-2024-9264 5 - CVE-2024-20481 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    26 Oct 2024

    85 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Actualización de seguridad para Grafana ➡️ CVE-2024-9264 (LFi) Local File Inclusion via SQL https://t.co/dPAUPYJ1M0 https://t.co/dHuxmNT7qj

    @elhackernet

    25 Oct 2024

    4109 Impressions

    5 Retweets

    38 Likes

    5 Bookmarks

    0 Replies

    1 Quote

  17. Oh yes the reason I came online before I got lost in sports and tech updates. #Grafana RCE in the Grafana SQL Expression feature. Don't forget to keep access to you logs secure. CVE-2024-9264 EPSS - public exploit available as https://t.co/M9a4ozAxBS

    @Matshi_M

    24 Oct 2024

    20 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  18. CVE-2024-9264: SQL injection vulnerability in Grafana's experimental SQL Expressions feature. Any authenticated user can execute arbitrary DuckDB SQL queries through modified expressions in Grafana dashboards. PoC https://t.co/AhS3qmjWGu https://t.co/bmfdfOH3Z9

    @cyber_advising

    22 Oct 2024

    2397 Impressions

    11 Retweets

    28 Likes

    15 Bookmarks

    0 Replies

    1 Quote

  19. CVE-2024-9264 - Remote Code Execution in Grafana via SQL Expressions and improper sanitized DuckDB SQL queries PoC: https://t.co/bXo1sRSSU0 Blog: https://t.co/b0jUKBHwpZ https://t.co/btzuDj3yTV

    @z3k0sec

    21 Oct 2024

    139 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. 🚨 Sécurité Cloud : vulnérabilité critique de Grafana (CVE-2024-9264) 🚨 Une faille critique vient d’être identifiée, et ce correctif est essentiel pour maintenir la sécurité de vos systèmes. https://t.co/ccXZgMGC2z #CloudSecOps #SécuritéInformatique #Vulnérabilité #Grafana

    @A1CloudTech

    21 Oct 2024

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. #Grafana Remote Code Execution PoC (CVE-2024-9264) https://t.co/b0jUKBGYAr https://t.co/0abDw8iErX

    @z3k0sec

    21 Oct 2024

    127 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. RCE in Grafana via SQL Expressions (CVE-2024-9264) https://t.co/bXo1sRSl4s #grafana #rce #exploit

    @z3k0sec

    21 Oct 2024

    499 Impressions

    3 Retweets

    10 Likes

    4 Bookmarks

    1 Reply

    1 Quote

  23. 🚨 Zafiyet Duyurusu: Grafana 11.x Daha fazla bilgi için: https://t.co/md36LTnRcX #CVE20249264 CVE-2024-9264 https://t.co/ghH5bMHt0D

    @cybSec4everyone

    20 Oct 2024

    92 Impressions

    0 Retweets

    2 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  24. GitHub - nollium/CVE-2024-9264: Exploit for Grafana arbitrary file-read (CVE-2024-9264) - https://t.co/8y8xolgPFl

    @piedpiper1616

    20 Oct 2024

    6631 Impressions

    25 Retweets

    64 Likes

    18 Bookmarks

    1 Reply

    0 Quotes

  25. Exploit for Grafana arbitrary file-read (CVE-2024-9264) https://t.co/xg4HMnC0Gv #Pentesting #CyberSecurity #Infosec https://t.co/beOrqU0tXF

    @ptracesecurity

    20 Oct 2024

    6160 Impressions

    17 Retweets

    66 Likes

    19 Bookmarks

    0 Replies

    0 Quotes

  26. Top 5 Trending CVEs: 1 - CVE-2024-38178 2 - CVE-2024-9264 3 - CVE-2024-48904 4 - CVE-2019-5790 5 - CVE-2024-7254 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    20 Oct 2024

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 分享一个鸡肋的CVE漏洞,原理与POC. [CVE-2024-9264]Grafana Post-Auth DuckDB SQL注入漏洞 (文件读取) Grafana 是一个开源的数据可视化和监控工具,广泛用于展示各种数据源的实时监控信息。它支持自定义仪表盘,帮助用户分析、追踪系统性能和业务指标。 利用Ldap协议可以RCE,利用条件: 1.… https://t.co/leSWhVTE4p https://t.co/NxjSN6aM54

    @seclink

    20 Oct 2024

    689 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  28. https://t.co/tAOSYVaaUK Proof-of-Concept File-Read in Grafana (CVE-2024-9264)

    @z3k0sec

    20 Oct 2024

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. CRITICAL VULNERABILITIES Grafana security release: Critical severity fix for CVE-2024-9264 URL: https://t.co/ifr6SH2Y0Q Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.4 CVEs: CVE-2024-9264 #securety #redhat #grafina

    @CharyyevPerman

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. CVE-2024-9264 alert 🚨 GRAFANA : Critical vulnerability leading to Remote Code Execution The vulnerability is actively exploited in the wild and has been integrated into Patrowl. Our customers assets are protected. 🦉 #CyberSecurity #InfoSec #grafana https://t.co/DN2kLFqj7A

    @Patrowl_io

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. Grafana’da Kritik RCE Zafiyeti (CVE-2024-9264): Hemen Güncelleyin! https://t.co/3R8d0gNJND https://t.co/zKLEDqQScL

    @cozumpark

    308 Impressions

    1 Retweet

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. Wrote a POC and vulnerability analysis for CVE-2024-9264 Grafana authenticated ""RCE"" https://t.co/Q23VOGATkQ https://t.co/rBxzfrMpQP

    @nol_tech

    20133 Impressions

    80 Retweets

    319 Likes

    192 Bookmarks

    5 Replies

    2 Quotes

  33. 🔴New vulnerability was just published🔴 CVE ➡️ CVE-2024-9264 Impacting ➡️ Grafana CVSS ➡️ 9.9 #cve #securitricks #vulnerability #cybersecurity https://t.co/3OiwtZ5fW1

    @SecuriTricks

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Command injection and local file inclusion via SQL Expressions in Grafana >= v11.0 (CVE-2024-9264) - experimental feature is enabled by default - DuckDB has to be installed and added to PATH variable - attacker needs to have at least Viewer permissions https://t.co/aHW34GC

    @z3k0sec

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  35. [CVE-2024-9264: CRITICAL] Grafana's SQL Expressions feature has a vulnerability allowing command injection and local file inclusion due to unsanitized user input in `duckdb` queries. An attacker with VIEWER permis...#cybersecurity,#vulnerability https://t.co/oApdaTZZ2J https://t.

    @CveFindCom

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. CVE-2024-9264 Exploitable SQL Expressions Command Injection in Grafana via `duckdb` Grafana's SQL Expressions experimental feature lets users run `duckdb` queries. These queries take user input. But they aren't c... https://t.co/vgNEr8BuGt

    @VulmonFeeds

    102 Impressions

    1 Retweet

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  37. CVE-2024-9264 The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized befo… https://t.co/zNri61Og24

    @CVEnew

    467 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. CVE-2024-9264: Execute Arbitrary Code in Grafana, 9.9 rating 🔥🔥🔥 Hackers can perform command injection using a vulnerability in SQL Expressions. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/BvfGdGWbvY #cybersecurity #vulnerability_map #grafana https://t.co/jV494

    @Netlas_io

    6526 Impressions

    24 Retweets

    91 Likes

    43 Bookmarks

    0 Replies

    0 Quotes

  39. Patch Now! Grafana Hit by 9.9 Severity RCE Vulnerability #Grafana users, beware of CVE-2024-9264! Discover the details of this critical security vulnerability and find out how to safeguard your systems from potential attacks https://t.co/0AdOOEGfN9

    @the_yellow_fall

    133 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. ¡Actualiza ya! Vulnerabilidad crítica de RCE en #Grafana (CVE-2024-9264) #CiberSeguridad https://t.co/9weBHsUUAg

    @hack4lifemx

    133 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. Patch Now! Grafana Hit by 9.9 Severity RCE Vulnerability (CVE-2024-9264) https://t.co/U6zOGCYYGw

    @Dinosn

    13427 Impressions

    88 Retweets

    203 Likes

    71 Bookmarks

    0 Replies

    0 Quotes

  42. GrafanaでCVSSスコア9.9の遠隔コード実行脆弱性が修正された。CVE-2024-9264は実験的機能の"SQL Expressions"におけるクエリのサニタイズが不完全であるため、コマンドインジェクションが成立するもの。閲覧者以上の権限が攻撃条件。一時的緩和策はDuckDBのパスを切る/削除。 https://t.co/qN38Vq9kue

    @__kokumoto

    915 Impressions

    2 Retweets

    9 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  43. Grafana fixes a critical vulnerability CVE-2024-9264 #Grafana #CVE-2024-9264 https://t.co/UVUFyRUn5M

    @pravin_karthik

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations