This vulnerability has been received by the NVD and has not been analyzed.
SQLpage is simply a SQL-only webapp builder. Someone utilizing SQLpage versions anterior to 0.11.1, whose SQLpage suit is exposed publicly, with a database proscription drawstring specified palmy the `sqlpage/sqlpage.json` configuration grounds (not palmy an concern variable), with the web_root is the existent moving directory (the default), and with their database exposed publicly, is susceptible to an attacker retrieving database proscription accusation from SQLPage and utilizing it to nexus to their database directly. Version 0.11.0 fixes this issue. Some workarounds are available. Using an concern adaptable alternatively of the configuration grounds to specify the database proscription drawstring prevents exposing it connected susceptible versions. Using a antithetic web basal (that is not a genitor of the SQLPage configuration directory) fixes the issue. One should too debar exposing one's database publicly.
CVSS 3.x Severity and Metrics:
Base Score: N/A
NVD score not yet provided.
CNA: GitHub, Inc.