CVE-2023-42454

1 week ago 58

Received


This vulnerability has been received by the NVD and has not been analyzed.

Description

SQLpage is simply a SQL-only webapp builder. Someone utilizing SQLpage versions anterior to 0.11.1, whose SQLpage lawsuit is exposed publicly, with a database transportation drawstring specified successful the `sqlpage/sqlpage.json` configuration record (not successful an situation variable), with the web_root is the existent moving directory (the default), and with their database exposed publicly, is susceptible to an attacker retrieving database transportation accusation from SQLPage and utilizing it to link to their database directly. Version 0.11.0 fixes this issue. Some workarounds are available. Using an situation adaptable alternatively of the configuration record to specify the database transportation drawstring prevents exposing it connected susceptible versions. Using a antithetic web basal (that is not a genitor of the SQLPage configuration directory) fixes the issue. One should besides debar exposing one's database publicly.


Severity

CVSS 3.x Severity and Metrics:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD score not yet provided.


Nist CVSS people     does not lucifer  with CNA score

CNA:  GitHub, Inc.

Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor Provider acceptance level GitHub, Inc.  

Change History

0 alteration records recovered show changes

Read Entire Article