关联漏洞
标题:
Grafana 安全漏洞
(CVE-2024-9264)
描述:Grafana是Grafana开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana存在安全漏洞,该漏洞源于SQL表达式实验性功能在处理用户输入的duckdb查询时,未能充分清理,导致命令注入和本地文件包含漏洞。
描述
File Read Proof of Concept for CVE-2024-9264
介绍
# File-Read-CVE-2024-9264
Proof Of Concept for File Read in Grafana (CVE-2024-9264)
## Prerequisites
- authenticated Grafana user with `Viewer` permissions or higher
- DuckDB binary must be installed and accessible through Grafana's PATH
## Impacted version
Grafana >= v11.0.0 (all v11.x.y are impacted)
## Usage
```
python3 poc.py [--url <target>] [--user <username>] [--password <password>] [--file <path>]
```
## Example
```
python3 poc.py --url http://127.0.0.1:3000 --user eviluser --password eviluser --file /etc/passwd
```
## Disclaimer
This script is intended for educational purposes and for use in controlled environments where you have permission to test the security of the system. Misuse of this tool could lead to legal consequences.
## More
https://grafana.com/blog/2024/10/17/grafana-security-release-critical-severity-fix-for-cve-2024-9264/
文件快照
[4.0K] /data/pocs/070ba64e1550e2ee3a3d2a7877f2c7f98f5b793f
├── [ 958] docker-compose.yml
├── [ 456] Dockerfile
├── [2.7K] poc.py
└── [ 867] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。