Логотип exploitDog
bind:CVE-2024-9264
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-9264

Количество 8

Количество 8

ubuntu логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
redhat логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
nvd логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
debian логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the eva ...

CVSS3: 9.9
EPSS: Критический
github логотип

GHSA-q99m-qcv4-fpm7

8 месяцев назад

Grafana Command Injection And Local File Inclusion Via Sql Expressions

CVSS3: 9.9
EPSS: Критический
fstec логотип

BDU:2024-08254

9 месяцев назад

Уязвимость функции Expressions платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
EPSS: Критический
redos логотип

ROS-20241211-09

6 месяцев назад

Множественные уязвимости grafana

CVSS3: 9.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3911-1

8 месяцев назад

Security update for govulncheck-vulndb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
8 месяцев назад
redhat логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
8 месяцев назад
nvd логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
8 месяцев назад
debian логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the eva ...

CVSS3: 9.9
92%
Критический
8 месяцев назад
github логотип
GHSA-q99m-qcv4-fpm7

Grafana Command Injection And Local File Inclusion Via Sql Expressions

CVSS3: 9.9
92%
Критический
8 месяцев назад
fstec логотип
BDU:2024-08254

Уязвимость функции Expressions платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
92%
Критический
9 месяцев назад
redos логотип
ROS-20241211-09

Множественные уязвимости grafana

CVSS3: 9.9
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3911-1

Security update for govulncheck-vulndb

8 месяцев назад

Уязвимостей на страницу