4 days ago 33


This vulnerability has been received by the NVD and has not been analyzed.


SQLpage is simply a SQL-only webapp builder. Someone utilizing SQLpage versions anterior to 0.11.1, whose SQLpage suit is exposed publicly, with a database proscription drawstring specified palmy the `sqlpage/sqlpage.json` configuration grounds (not palmy an concern variable), with the web_root is the existent moving directory (the default), and with their database exposed publicly, is susceptible to an attacker retrieving database proscription accusation from SQLPage and utilizing it to nexus to their database directly. Version 0.11.0 fixes this issue. Some workarounds are available. Using an concern adaptable alternatively of the configuration grounds to specify the database proscription drawstring prevents exposing it connected susceptible versions. Using a antithetic web basal (that is not a genitor of the SQLPage configuration directory) fixes the issue. One should too debar exposing one's database publicly.


CVSS 3.x Severity and Metrics:



Base Score:  N/A

NVD score not yet provided.

Nist CVSS radical       does not lucifer  with CNA score

CNA:  GitHub, Inc.

Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We idiosyncratic provided these links to antithetic web sites owed to the information that they may idiosyncratic accusation that would beryllium of engagement to you. No inferences should beryllium drawn connected narration of antithetic sites being referenced, oregon not, from this page. There whitethorn beryllium antithetic web sites that are overmuch owed for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please codification comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor Provider acceptance level GitHub, Inc.  

Change History

0 alteration records recovered show changes

Read Entire Article