Security: Attackers can execute their own commands via Grafana vulnerability

The data visualization tool Grafana is vulnerable, and attackers can execute their own commands on systems and view passwords, among other things.

Save to Pocket listen Print view

(Image: AFANASEV IVAN/Shutterstock.com)

2 min. read

A"critical" security vulnerability in Grafana puts systems at risk. Admins should quickly install one of the secure versions.

Grafana is a cross-platform open source application that collects and visualizes data from various sources such as MySQL or Prometheus. Attackers can now exploit a vulnerability (CVE-2024-9264) to attack computers. If such an attack succeeds, attackers have access to all files on a host PC, according to the Grafana developers. This can also include unencrypted passwords, which attackers can use for further propagation (Network Lateral Movement).

In a warning message, the developers state that only version branches 11.0.x, 11.1.x and 11.2.x are affected. Grafana 10.x is not threatened by the vulnerability. Due to insufficient checks, attackers can inject and execute their own commands via duckdb queries in the context of the SQL expression experimental feature. It is currently not known in detail how such an attack could take place.

The developers assure us that they have closed the vulnerability in the following versions:

  • 11.0.5+security-01
  • 11.1.6+security-01
  • 11.2.1+security-01
    11.0.6+security-01
  • 11.1.7+security-01
  • 11.2.2+security-01

If admins are unable to install security updates immediately, they should protect systems temporarily using a workaround: To do this, they must remove the vulnerable duckdb binary from the system.

Grafana claims to have discovered the vulnerability internally at the end of September this year. The security patches are available immediately. It is currently not known whether there are already attacks. It also remains unclear how admins can detect systems that have already been attacked.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.