CVE-2024-9264
CRITICAL NUCLEIGrafana < 11.0.6+security-01 - Command Injection
Title source: ruleDescription
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Exploits (13)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Grafana(CVE-2024-9264).py
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-9264
nomisec
WORKING POC
by amalpvatayam67 · poc
https://github.com/amalpvatayam67/day05-grafana-sqlexpr-lab
Nuclei Templates (1)
Grafana Post-Auth DuckDB - SQL Injection To File Read
CRITICALby princechaddha
Shodan:
http.title:"grafana" || cpe:"cpe:2.3:a:grafana:grafana"
FOFA:
app="grafana" || title="grafana"
Scores
CVSS v3
9.9
EPSS
0.9405
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Classification
CWE
CWE-94
CWE-77
Status
published
Affected Products (2)
grafana/grafana
grafana/grafana
< 11.0.6+security-01Go
Timeline
Published
Oct 18, 2024
Tracked Since
Feb 18, 2026