一、 漏洞 CVE-2023-36830 基础信息
漏洞标题
具有访问配置文件的用户的SQLFluff漏洞,通过`library_path`调用任意的Python代码。
来源:AIGC 神龙大模型
漏洞描述信息
对于有权访问配置文件的SQLFluff用户,存在漏洞,攻击者可以通过使用`library_path`调用任意Python代码。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
对生成代码的控制不恰当(代码注入)
来源:AIGC 神龙大模型
漏洞标题
SQLFluff vulnerability for users with access to config file, using `library_path` to call arbitrary python code.
来源:美国国家漏洞数据库 NVD
漏洞描述信息
SQLFluff is a SQL linter. Prior to version 2.1.2, in environments where untrusted users have access to the config files, there is a potential security vulnerability where those users could use the `library_path` config value to allow arbitrary python code to be executed via macros. For many users who use SQLFluff in the context of an environment where all users already have fairly escalated privileges, this may not be an issue - however in larger user bases, or where SQLFluff is bundled into another tool where developers still wish to give users access to supply their on rule configuration, this may be an issue. The 2.1.2 release offers the ability for the `library_path` argument to be overwritten on the command line by using the `--library-path` option. This overrides any values provided in the config files and effectively prevents this route of attack for users which have access to the config file, but not to the scripts which call the SQLFluff CLI directly. A similar option is provided for the Python API, where users also have a greater ability to further customise or override configuration as necessary. Unless `library_path` is explicitly required, SQLFluff maintainers recommend using the option `--library-path none` when invoking SQLFluff which will disable the `library-path` option entirely regardless of the options set in the configuration file or via inline config directives. As a workaround, limiting access to - or otherwise validating configuration files before they are ingested by SQLFluff will provides a similar effect and does not require upgrade.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
输出中的特殊元素转义处理不恰当(注入)
来源:美国国家漏洞数据库 NVD
漏洞标题
SQLFluff 注入漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
SQLFluff是一种方言灵活且可配置的 SQL linter。 SQLFluff 2.1.2之前版本存在注入漏洞,该漏洞源于允许攻击者通过libary_path调用任意python代码。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
注入
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-36830 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2023-36830 的情报信息