Loading HuntDB...

Path traversal in command line client

Medium
M
MariaDB
Submitted None
Reported by lixtelnis

Vulnerability Details

Technical details and impact analysis

Path Traversal
The command line client has a directory traversal bug which allows server chosen files to be dlopened when it connects to a malicious server. The path can also be padded with `/` characters so that `strxnmov` drops the `.so` extension. The `dlopen` call is performed here: <https://github.com/MariaDB/server/blob/10.5/sql-common/client_plugin.c#L368> ## Impact In rare situations where the attacker controls a file at a known location on the victim's machine this can lead to code execution using `init/fini` functions. See attached `dlopen.sh`. Other side effects present in commonly installed software are not to be neglected. The mecanism is far from being uncommon in C files alone according to this search: <https://codesearch.debian.net/search?q=__attribute__.*constructor+filetype%3Ac&perpkg=1> Without abusing the path traversal bug the dialog plugin might also be used to fool a user into sending its password unhashed. See attached `dialog.sh`.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Path Traversal