#VU16550 Remote code execution in SQLite


Published: 2018-12-17

Vulnerability identifier: #VU16550

Vulnerability risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SQLite
Server applications / Database software

Vendor: SQLite

Description
The vulnerability allows a remote attacker to compromise the target system.

The weakness exists in the browsers supporting SQLite and Web SQL API due to an error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code with elevated privileges. Less successful exploitation of the vulnerability may result in leaking program memory or causing program crashes.

Note: the vulnerability has no CVE-identificator and has been dubbed "Magellan" by the researchers.

Mitigation
Update to version 3.26.0.

Vulnerable software versions

SQLite: 1.1.0 - 3.25.3


External links
http://blade.tencent.com/magellan/index_en.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability