Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q99m-qcv4-fpm7

Опубликовано: 18 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.4
CVSS3: 9.9

Описание

Grafana Command Injection And Local File Inclusion Via Sql Expressions

The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

Пакеты

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 11.0.0, <= 11.0.6

11.0.6+security-01

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 11.1.0, <= 11.1.7

11.1.7+security-01

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 11.2.0, <= 11.2.2

11.2.2+security-01

EPSS

Процентиль: 100%
0.92455
Критический

9.4 Critical

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-77
CWE-94

Связанные уязвимости

CVSS3: 9.9
ubuntu
11 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
redhat
11 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
nvd
11 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
debian
11 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the eva ...

CVSS3: 9.9
fstec
12 месяцев назад

Уязвимость функции Expressions платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.92455
Критический

9.4 Critical

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-77
CWE-94