BIT-grafana-2024-9264

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/grafana/BIT-grafana-2024-9264.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-grafana-2024-9264
Aliases
Published
2024-10-22T07:09:52.003Z
Modified
2024-11-02T07:36:38.597Z
Summary
[none]
Details

The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

References

Affected packages

Bitnami / grafana

Package

Name
grafana
Purl
pkg:bitnami/grafana

Severity

  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
11.0.0
Fixed
11.0.5
Introduced
11.1.0
Fixed
11.1.6
Introduced
11.2.0
Fixed
11.2.1
Introduced
11.0.0
Fixed
11.0.6
Introduced
11.1.0
Fixed
11.1.7
Introduced
11.2.0
Fixed
11.2.2