{"id":"CVE-2024-9264","details":"The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack.  The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.","aliases":["BIT-grafana-2024-9264","GHSA-q99m-qcv4-fpm7","GO-2024-3215"],"modified":"2026-03-20T12:40:46.664866Z","published":"2024-10-18T04:15:04.723Z","related":["CGA-3mqw-v2g6-57gg","SUSE-SU-2024:3911-1","SUSE-SU-2025:01985-1","SUSE-SU-2025:01987-1","SUSE-SU-2025:01989-1","SUSE-SU-2025:01991-1","openSUSE-SU-2024:0350-1","openSUSE-SU-2024:14431-1","openSUSE-SU-2024:14447-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250314-0007/"},{"type":"ADVISORY","url":"https://grafana.com/security/security-advisories/cve-2024-9264/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/grafana/grafana","events":[{"introduced":"0"},{"last_affected":"277ef258d4b9a5acdf2932347c6a4ca72d739b28"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"11.0.0"}]}}],"versions":["pkg/promlib/v0.0.1","pkg/promlib/v0.0.2","pkg/promlib/v0.0.3","pkg/promlib/v0.0.4","pkg/util/xorm/v0.0.1","v0.0.0-cloud","v0.0.1-test","v1.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.1.0","v1.2.0","v1.3.0","v1.4.0","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.5.4","v1.6.0","v1.6.1","v1.7.0","v1.7.0-rc1","v1.8.0","v1.8.0-rc1","v1.8.1","v1.9.0","v1.9.0-rc1","v1.9.1","v10.0.0-preview","v11.0.0","v2.0.0-beta1","v2.0.0-beta3","v2.0.1","v2.0.2","v2.1.0","v2.1.1","v2.1.2","v2.5.0","v2.6.0","v2.6.0-beta1","v3.0-beta1","v3.0-beta2","v3.0-beta3","v3.0-beta4","v3.0-beta5","v3.0.0-beta6","v3.0.0-beta7","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.0-beta1","v3.1.1","v3.2.1-test","v4.0.0","v4.0.0-beta1","v4.0.0-beta2","v4.0.1","v4.0.2","v4.1.0-beta1","v4.2.0-beta1","v4.3.0","v4.3.0-beta1","v4.3.1","v4.3.2","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.5.0","v4.5.0-beta1","v4.5.1","v4.6.0-beta1","v5.,2.4","v5.0.0","v5.0.0-beta1","v5.0.0-beta2","v5.0.0-beta3","v5.0.0-beta4","v5.0.0-beta5","v6.0.0-beta1","v6.5","v8.3.3","v8.4.0-beta1","v8.5.16","v9.3.0-beta1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-9264.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}