CVE-2024-9264

Name
CVE-2024-9264
Description
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://grafana.com/security/security-advisories/cve-2024-9264/
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20250314-0007/

Match rules

CPE URI Source package Min version Max version
grafana >= 11.0.0 < 11.0.5
grafana >= 11.1.0 < 11.1.6
grafana >= 11.2.0 < 11.2.1
grafana >= 11.0.0 < 11.0.6
grafana >= 11.1.0 < 11.1.7
grafana >= 11.2.0 < 11.2.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
grafana edge-community 11.1.4-r0 Konstantin Kulikov <k.kulikov2@gmail.com> possibly vulnerable
grafana 3.22-community 11.1.4-r0 None possibly vulnerable
grafana 3.20-community 11.0.7-r0 Konstantin Kulikov <k.kulikov2@gmail.com> fixed
grafana 3.20-community 11.0.6-r0 Konstantin Kulikov <k.kulikov2@gmail.com> possibly vulnerable