Arbitrary Command Injection Affecting grafana package, versions <11.0.7-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
20.24% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE320-GRAFANA-8302728
  • published24 Oct 2024
  • disclosed18 Oct 2024

Introduced: 18 Oct 2024

CVE-2024-9264  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade Alpine:3.20 grafana to version 11.0.7-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana package and not the grafana package as distributed by Alpine. See How to fix? for Alpine:3.20 relevant fixed versions and status.

The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS Scores

version 3.1