Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31196
HistorySep 02, 2022 - 7:45 p.m.

CVE-2022-31196 Server-Side Request Forgery (SSRF) vulnerability in Databasir

2022-09-0219:45:13
CWE-918
GitHub_M
www.cve.org
2
cve-2022-31196
ssrf vulnerability
databasir
http post request
jdbcdriverfileurl
intranet information

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

45.5%

Databasir is a database metadata management platform. Databasir <= 1.06 has Server-Side Request Forgery (SSRF) vulnerability. The SSRF is triggered by a sending a single HTTP POST request to create a databaseType. By supplying a jdbcDriverFileUrl that returns a non 200 response code, the url is executed, the response is logged (both in terminal and in database) and is included in the response. This would allow an attackers to obtain the real IP address and scan Intranet information. This issue was fixed in version 1.0.7.

CNA Affected

[
  {
    "product": "databasir",
    "vendor": "vran-dev",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.0.7"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

45.5%

Related for CVELIST:CVE-2022-31196