Vulnerability Management, Patch/Configuration Management, Cloud Security
Grafana critical vulnerability risks remote code execution

(Credit: Timon – stock.adobe.com)
Grafana, an open-source data analytics and visualization platform, was found to have a critical vulnerability that could lead to remote code execution.The flaw, tracked as CVE-2024-9264, which has a CVSS v4 score of 9.4, was introduced in Grafana version 11 released in May 2024, Grafana Labs disclosed Thursday. The vulnerability stems from an experimental feature called SQL Expressions, which allows for post-processing of data source query outputs via SQL queries to the open-source relational database management system DuckDB.Grafana’s SQL Expressions feature does not properly sanitize these SQL queries to the DuckDB command line interface (CLI), which can allow for both command injection and local file inclusion via a malicious query. This vulnerability could be exploited by any user with a “viewer” permission or higher, according to Grafana Labs.SQL Expression is enabled by default for the Grafana API, however, Grafana Lab noted that the vulnerability is only exploitable if the DuckDB binary is installed and included in the PATH of the Grafana process’ environment, which is not the default. SC Media contacted Grafana and asked how many users were believed to be using vulnerable and exploitable versions of the platform, and did not receive a response. The open-source intelligence (OSINT) platform Netlas.io reported that more than 100,000 Grafana instances were “probably vulnerable to CVE-2024-9264” Friday, including nearly 19,000 in the United States.
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds