Nocodb contains SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database.
nocodb/nocodb
SqliteClient.ts
(GHSL-2023-141
)By supplying a specially crafted payload to the given below parameter and endpoint, an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injections, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database.
The triggerList
method creates a SQL query using the user-controlled table_name
parameter value from the tableCreate
endpoint.
async triggerList(args: any = {}) {
const _func = this.triggerList.name;
const result = new Result();
log.api(`${_func}:args:`, args);
try {
args.databaseName = this.connectionConfig.connection.database;
const response = await this.sqlClient.raw(
`select *, name as trigger_name from sqlite_master where type = 'trigger' and tbl_name='${args.tn}';`,
);
[...]
This issue may lead to Information Disclosure
.
This issue was discovered and reported by GHSL team member @sylwia-budzynska (Sylwia Budzynska).
This report is subject to our coordinated disclosure policy.
{ "nvd_published_at": "2023-10-17T21:15:46Z", "cwe_ids": [ "CWE-89" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-10-17T13:52:09Z" }