Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q99m-qcv4-fpm7

Опубликовано: 18 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.4
CVSS3: 9.9

Описание

Grafana Command Injection And Local File Inclusion Via Sql Expressions

The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

Пакеты

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 11.0.0, <= 11.0.6

11.0.6+security-01

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 11.1.0, <= 11.1.7

11.1.7+security-01

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 11.2.0, <= 11.2.2

11.2.2+security-01

EPSS

Процентиль: 100%
0.92337
Критический

9.4 Critical

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-77
CWE-94

Связанные уязвимости

CVSS3: 9.9
ubuntu
8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
redhat
8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
nvd
8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
debian
8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the eva ...

CVSS3: 9.9
fstec
9 месяцев назад

Уязвимость функции Expressions платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.92337
Критический

9.4 Critical

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-77
CWE-94