关联漏洞
标题:Grafana 安全漏洞 (CVE-2024-9264)Description:Grafana是Grafana开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana存在安全漏洞,该漏洞源于SQL表达式实验性功能在处理用户输入的duckdb查询时,未能充分清理,导致命令注入和本地文件包含漏洞。
Description
File Read Proof of Concept for CVE-2024-9264
介绍
# File-Read-CVE-2024-9264
Proof Of Concept for File Read in Grafana (CVE-2024-9264)
## Prerequisites
- authenticated Grafana user with `Viewer` permissions or higher
- DuckDB binary must be installed and accessible through Grafana's PATH
## Impacted version
Grafana >= v11.0.0 (all v11.x.y are impacted)
## Usage
```
python3 poc.py [--url <target>] [--user <username>] [--password <password>] [--file <path>]
```
## Example
```
python3 poc.py --url http://127.0.0.1:3000 --user eviluser --password eviluser --file /etc/passwd
```
## Disclaimer
This script is intended for educational purposes and for use in controlled environments where you have permission to test the security of the system. Misuse of this tool could lead to legal consequences.
## More
https://grafana.com/blog/2024/10/17/grafana-security-release-critical-severity-fix-for-cve-2024-9264/
文件快照
[4.0K] /data/pocs/070ba64e1550e2ee3a3d2a7877f2c7f98f5b793f
├── [ 958] docker-compose.yml
├── [ 456] Dockerfile
├── [2.7K] poc.py
└── [ 867] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →