Miggo Logo

CVE-2025-24787: WhoDB allows parameter injection in DB connection URIs leading to local file inclusion

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.28393%
Published
2/6/2025
Updated
2/7/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/clidey/whodb/corego< 0.0.0-20250127202645-8d67b767e0050.0.0-20250127202645-8d67b767e005

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from unsafe string concatenation when building database connection URIs across multiple database drivers. The MySQL DB function in mysql/db.go is explicitly called out in the vulnerability details as the attack vector through Loc parameter injection. The commit diff shows similar unsafe patterns in other database plugins (Postgres, ClickHouse) that were also patched by moving to structured configuration objects and proper encoding. While MySQL has the highest confidence due to explicit PoC details, other database connectors show similar vulnerable patterns that were addressed in the security fix.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** *ppli**tion is vuln*r**l* to p*r*m*t*r inj**tion in **t***s* *onn**tion strin*s, w*i** *llows *n *tt**k*r to r*** lo**l *il*s on t** m***in* t** *ppli**tion is runnin* on. ### **t*ils T** *ppli**tion us*s strin* *on**t*n*tion to *u

Reasoning

T** vuln*r**ility st*mm** *rom uns*** strin* *on**t*n*tion w**n *uil*in* **t***s* *onn**tion URIs **ross multipl* **t***s* *riv*rs. T** MySQL ** *un*tion in mysql/**.*o is *xpli*itly **ll** out in t** vuln*r**ility **t*ils *s t** *tt**k v**tor t*rou*