Databasir is a database metadata management platform. Databasir <= 1.06 has Server-Side Request Forgery (SSRF) vulnerability. The SSRF is triggered by a sending a **single** HTTP POST request to create a databaseType. By supplying a `jdbcDriverFileUrl` that returns a non `200` response code, the url is executed, the response is logged (both in terminal and in database) and is included in the response. This would allow an attackers to obtain the real IP address and scan Intranet information. This issue was fixed in version 1.0.7.
References
Link | Resource |
---|---|
https://github.com/vran-dev/databasir/commit/226c20e0c9124037671a91d6b3e5083bd2462058 | Patch Third Party Advisory |
https://github.com/vran-dev/databasir/releases/tag/v1.0.7 | Release Notes Third Party Advisory |
https://github.com/vran-dev/databasir/security/advisories/GHSA-qvg8-427f-852q | Exploit Third Party Advisory |
https://github.com/vran-dev/databasir/commit/226c20e0c9124037671a91d6b3e5083bd2462058 | Patch Third Party Advisory |
https://github.com/vran-dev/databasir/releases/tag/v1.0.7 | Release Notes Third Party Advisory |
https://github.com/vran-dev/databasir/security/advisories/GHSA-qvg8-427f-852q | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
References | () https://github.com/vran-dev/databasir/commit/226c20e0c9124037671a91d6b3e5083bd2462058 - Patch, Third Party Advisory | |
References | () https://github.com/vran-dev/databasir/releases/tag/v1.0.7 - Release Notes, Third Party Advisory | |
References | () https://github.com/vran-dev/databasir/security/advisories/GHSA-qvg8-427f-852q - Exploit, Third Party Advisory |
Information
Published : 2022-09-02 20:15
Updated : 2024-11-21 07:04
NVD link : CVE-2022-31196
Mitre link : CVE-2022-31196
CVE.ORG link : CVE-2022-31196
JSON object : View
Products Affected
databasir
- databasir
CWE
CWE-918
Server-Side Request Forgery (SSRF)