Bug 2316409 (CVE-2024-9264) - CVE-2024-9264 grafana: Command injection and local file inclusion via SQL Expressions
Summary: CVE-2024-9264 grafana: Command injection and local file inclusion via SQL Exp...
Keywords:
Status: NEW
Alias: CVE-2024-9264
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-04 00:57 UTC by OSIDB Bzimport
Modified: 2024-10-24 05:05 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-10-04 00:57:59 UTC
An experimental feature named SQL Expressions was recently added to Grafana (as part of 11.0.0) that allows for query output to be post-processed using SQL; these SQL queries were incompletely sanitized, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack.

Due to an incorrect implementation of feature flags, this experimental feature is enabled by default for the API. However, to be exploitable, the Grafana process’ PATH must contain the DuckDB binary– if DuckDB is not present, the system is not vulnerable. The DuckDB binary is not packaged with Grafana by default, so to be exploitable a system must explicitly install it and include it in Grafana’s PATH.


Note You need to log in before you can comment on or make changes to this bug.