• 公告ID (KylinSec-SA-2024-4038)

摘要:

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

安全等级: Low

公告ID: KylinSec-SA-2024-4038

发布日期: 2024年10月25日

关联CVE: CVE-2024-9264  

  • 详细介绍

1. 漏洞描述

   

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-9264 KY3.4-5A grafana Unaffected
CVE-2024-9264 KY3.5.2 grafana Unaffected
CVE-2024-9264 V6 grafana Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-4037 下一篇:KylinSec-SA-2024-4070