CVE-2024-9264

CRITICAL NUCLEI

Grafana < 11.0.6+security-01 - Command Injection

Title source: rule

Description

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

Exploits (13)

nomisec WORKING POC 130 stars
by nollium · poc
https://github.com/nollium/CVE-2024-9264
github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Grafana(CVE-2024-9264).py
nomisec WORKING POC 39 stars
by z3k0sec · poc
https://github.com/z3k0sec/CVE-2024-9264-RCE-Exploit
nomisec WORKING POC 7 stars
by z3k0sec · poc
https://github.com/z3k0sec/File-Read-CVE-2024-9264
nomisec WORKING POC 3 stars
by Cythonic1 · poc
https://github.com/Cythonic1/CVE-2024-9264
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-9264
nomisec WORKING POC 2 stars
by rvizx · poc
https://github.com/rvizx/CVE-2024-9264
nomisec WRITEUP
by patrickpichler · poc
https://github.com/patrickpichler/grafana-CVE-2024-9264
nomisec WORKING POC
by ruizii · poc
https://github.com/ruizii/CVE-2024-9264
nomisec WORKING POC
by punitdarji · poc
https://github.com/punitdarji/Grafana-CVE-2024-9264
nomisec WORKING POC
by amalpvatayam67 · poc
https://github.com/amalpvatayam67/day05-grafana-sqlexpr-lab
nomisec WORKING POC
by Exerrdev · poc
https://github.com/Exerrdev/CVE-2024-9264-Fixed
nomisec WORKING POC
by Royall-Researchers · poc
https://github.com/Royall-Researchers/CVE-2024-9264

Nuclei Templates (1)

Grafana Post-Auth DuckDB - SQL Injection To File Read
CRITICALby princechaddha
Shodan: http.title:"grafana" || cpe:"cpe:2.3:a:grafana:grafana"
FOFA: app="grafana" || title="grafana"

Scores

CVSS v3 9.9
EPSS 0.9405
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Classification

CWE
CWE-94 CWE-77
Status published

Affected Products (2)

grafana/grafana
grafana/grafana < 11.0.6+security-01Go

Timeline

Published Oct 18, 2024
Tracked Since Feb 18, 2026