CVE-2023-42454 – sqlpage
Package
Manager: cargo
Name: sqlpage
Vulnerable Version: >=0 <0.11.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00101 pctl0.28528
Details
SQLpage vulnerable to public exposure of database credentials ### Impact If - you are using a SQLPage version older than v0.11.1 - your SQLPage instance is exposed publicly - the database connection string is specified in the `sqlpage/sqlpage.json` configuration file (not in an environment variable) - the web_root is the current working directory (the default) - your database is exposed publicly then an attacker could retrieve the database connection information from SQLPage and use it to connect to your database directly. ### Patches Upgrade to [v0.11.1](https://github.com/lovasoa/SQLpage/releases/tag/v0.11.1) as soon as possible. ### Workarounds If you cannot upgrade immediately: - Using an environment variable instead of the configuration file to specify the database connection string prevents exposing it on vulnerable versions. - Using a different [web root](https://github.com/lovasoa/SQLpage/blob/main/configuration.md) (that is not a parent of the SQLPage configuration directory) fixes the issue. - And in any case, you should generally avoid exposing your database publicly ### References https://github.com/lovasoa/SQLpage/issues/89
Metadata
Created: 2023-09-21T17:10:06Z
Modified: 2023-09-21T17:10:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-v5wf-jg37-r9m5/GHSA-v5wf-jg37-r9m5.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-v5wf-jg37-r9m5
Finding: F308
Auto approve: 1