CVE-2024-47062 Scanner
CVE-2024-47062 Scanner - SQL Injection vulnerability in Navidrome
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
18 days 18 hours
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Navidrome is an open source web-based music collection server and streamer, typically used by music enthusiasts and project developers. It allows users to manage and stream their music collections over the web, supporting multiple media formats. Organizations use it for internal media streaming, while individual users enjoy its open access and customization flexibility. It enhances personalized streaming experiences by maintaining user playlists and tracks preferences. Navidrome is favored for its ease of deployment across different operating systems, including Linux, Windows, and macOS. Its active development and support community highlight its popularity and adaptability for diverse musical streaming needs.
SQL Injection is a critical vulnerability that allows attackers to manipulate and execute arbitrary SQL commands in a database. In Navidrome, this vulnerability arises from improper handling of SQL query parameters, leading to potential data leaks. Attackers can exploit this flaw to gain unauthorized access to sensitive data by inserting malicious SQL statements. It exposes the system to data exfiltration risks, with possibilities for database manipulation and data corruption. Effective exploitation allows attackers to compromise the integrity and confidentiality of the database. Navidrome users are urged to mitigate potential impacts by upgrading to secured software versions.
The Navidrome vulnerability involves SQL queries where user-supplied inputs are not adequately sanitized or validated. The vulnerable endpoint includes parameters like 'password=...' which are embedded directly into SQL statements, leading to ORM leaks. Attackers can exploit the 'LIKE' statement in SQL to brute force sensitive data such as passwords. Parameters directly embedded into SQL queries without proper escaping hence become an attack vector. By manipulating these parameters, attackers gain access to confidential database information. The exploitation could involve crafting a URL with SMTP-like statements, thereby gaining significant control over the database.
Exploitation of this vulnerability may allow attackers to retrieve sensitive data, such as user credentials and confidential information, from the database. Attackers can manipulate SQL queries to gain unauthorized access, leading to data breaches and privacy violations. Leaked data can be used for further attacks, potentially causing reputational damage to affected parties. Successful exploitation can enable attackers to introduce malicious alterations to the database, leading to data corruption. The overall security and trust of the deployed Navidrome environment can be severely undermined, risking unintentional exposure to further cyber threats.
REFERENCES
- https://github.com/advisories/GHSA-58vj-cv5w-v4v6
- https://github.com/navidrome/navidrome/security/advisories/GHSA-58vj-cv5w-v4v6
- https://nvd.nist.gov/vuln/detail/CVE-2024-47062
SQL Injection is a critical vulnerability that allows attackers to manipulate and execute arbitrary SQL commands in a database. In Navidrome, this vulnerability arises from improper handling of SQL query parameters, leading to potential data leaks. Attackers can exploit this flaw to gain unauthorized access to sensitive data by inserting malicious SQL statements. It exposes the system to data exfiltration risks, with possibilities for database manipulation and data corruption. Effective exploitation allows attackers to compromise the integrity and confidentiality of the database. Navidrome users are urged to mitigate potential impacts by upgrading to secured software versions.
The Navidrome vulnerability involves SQL queries where user-supplied inputs are not adequately sanitized or validated. The vulnerable endpoint includes parameters like `password=...` which are embedded directly into SQL statements, leading to ORM leaks. Attackers can exploit the `LIKE` statement in SQL to brute force sensitive data such as passwords. Parameters directly embedded into SQL queries without proper escaping hence become an attack vector. By manipulating these parameters, attackers gain access to confidential database information. The exploitation could involve crafting a URL with SMTP-like statements, thereby gaining significant control over the database.
Exploitation of this vulnerability may allow attackers to retrieve sensitive data, such as user credentials and confidential information, from the database. Attackers can manipulate SQL queries to gain unauthorized access, leading to data breaches and privacy violations. Leaked data can be used for further attacks, potentially causing reputational damage to affected parties. Successful exploitation can enable attackers to introduce malicious alterations to the database, leading to data corruption. The overall security and trust of the deployed Navidrome environment can be severely undermined, risking unintentional exposure to further cyber threats.
REFERENCES