CVE-2024-9264

EUVD-2024-3110
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack.  The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Code Injection
Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.9 CRITICAL
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
GRAFANACNA
9.9 CRITICAL
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
grafanagrafana
11.0.5\+security-01 <
𝑥
< 11.0.5\+security-01
grafanagrafana
11.0.6\+security-01 <
𝑥
< 11.0.6\+security-01
grafanagrafana
11.1.6\+security-01 <
𝑥
< 11.1.6\+security-01
grafanagrafana
11.1.7\+security-01 <
𝑥
< 11.1.7\+security-01
grafanagrafana
11.2.1\+security-01 <
𝑥
< 11.2.1\+security-01
grafanagrafana
11.2.2\+security-01 <
𝑥
< 11.2.2\+security-01
grafanagrafana
11.0.0
𝑥
= Vulnerable software versions