Miggo Logo

CVE-2023-7104:
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue...

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.30097%
Published
12/29/2023
Updated
2/29/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly names sessionReadRecord in ext/session/sqlite3session.c as the affected function. The provided SQLite commit link (https://sqlite.org/src/info/0e4e7a05c4204b47) contains a patch for this file. Analyzing the diff from the fetched URL content shows that the changes are within a function that matches the structure and operations described for sessionReadRecord. Specifically, a new conditional block if( (pIn->nData-pIn->iNext)<8 ){ rc = SQLITE_CORRUPT_BKPT; }else{ ... } was added. This check prevents reading 8 bytes for SQLITE_INTEGER or SQLITE_FLOAT types if insufficient data remains in the input buffer pIn. The commit comment also states: "Fix a buffer overread in the sessions extension that could occur when processing a corrupt changeset." This directly supports the identification of sessionReadRecord as the vulnerable function where the overread could occur before the fix.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in SQLit* SQLit** up to *.**.* *n* *l*ssi*i** *s *riti**l. T*is issu* *****ts t** *un*tion s*ssionR***R**or* o* t** *il* *xt/s*ssion/sqlit**s*ssion.* o* t** *ompon*nt m*k* *llt*st **n*l*r. T** m*nipul*tion l***s to ***p-**s*

Reasoning

T** vuln*r**ility **s*ription *xpli*itly n*m*s `s*ssionR***R**or*` in `*xt/s*ssion/sqlit**s*ssion.*` *s t** *****t** *un*tion. T** provi*** SQLit* *ommit link (`*ttps://sqlit*.or*/sr*/in*o/****************`) *ont*ins * p*t** *or t*is *il*. *n*lyzin*