Количество 4
Количество 4
CVE-2025-24787
WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `&allowAllFiles=true`
GHSA-c7w4-9wv8-7x7c
WhoDB allows parameter injection in DB connection URIs leading to local file inclusion
BDU:2025-02454
Уязвимость системы управления базами данных WhoDB, связанная с недостаточной нейтрализацией специальных элементов в запросах данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
SUSE-SU-2025:0429-1
Security update for govulncheck-vulndb
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-24787 WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `&allowAllFiles=true` | CVSS3: 8.6 | 0% Низкий | около 1 года назад | |
GHSA-c7w4-9wv8-7x7c WhoDB allows parameter injection in DB connection URIs leading to local file inclusion | CVSS3: 8.6 | 0% Низкий | около 1 года назад | |
BDU:2025-02454 Уязвимость системы управления базами данных WhoDB, связанная с недостаточной нейтрализацией специальных элементов в запросах данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 8.6 | 0% Низкий | около 1 года назад | |
SUSE-SU-2025:0429-1 Security update for govulncheck-vulndb | 12 месяцев назад |
Уязвимостей на страницу