漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
SQLBot: SSRF to Arbitrary File Read (AFR) via Rogue MySQL
Vulnerability Description
SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a Server-Side Request Forgery (SSRF) vulnerability that allows an attacker to retrieve arbitrary system and application files from the server. An attacker can exploit the /api/v1/datasource/check endpoint by configuring a forged MySQL data source with a malicious parameter extraJdbc="local_infile=1". When the SQLBot backend attempts to verify the connectivity of this data source, an attacker-controlled Rogue MySQL server issues a malicious LOAD DATA LOCAL INFILE command during the MySQL handshake. This forces the target server to read arbitrary files from its local filesystem (such as /etc/passwd or configuration files) and transmit the contents back to the attacker. This issue was fixed in version 1.7.0.
CVSS Information
N/A
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
SQLBot 代码问题漏洞
Vulnerability Description
SQLBot是DataEase开源的一个基于大模型和RAG的智能问数系统。 SQLBot 1.7.0之前版本存在代码问题漏洞,该漏洞源于/api/v1/datasource/check端点存在服务器端请求伪造,可能导致读取任意本地文件。
CVSS Information
N/A
Vulnerability Type
N/A