Path traversal in command line client
Medium
M
MariaDB
Submitted None
Actions:
Reported by
lixtelnis
Vulnerability Details
Technical details and impact analysis
The command line client has a directory traversal bug which allows server chosen files to be dlopened when it connects to a malicious server.
The path can also be padded with `/` characters so that `strxnmov` drops the `.so` extension.
The `dlopen` call is performed here: <https://github.com/MariaDB/server/blob/10.5/sql-common/client_plugin.c#L368>
## Impact
In rare situations where the attacker controls a file at a known location on the victim's machine this can lead to code execution using `init/fini` functions. See attached `dlopen.sh`.
Other side effects present in commonly installed software are not to be neglected. The mecanism is far from being uncommon in C files alone according to this search:
<https://codesearch.debian.net/search?q=__attribute__.*constructor+filetype%3Ac&perpkg=1>
Without abusing the path traversal bug the dialog plugin might also be used to fool a user into sending its password unhashed. See attached `dialog.sh`.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Path Traversal