You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Security Advisory: Multiple Vulnerabilities in Navidrome
Summary
Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like password=... in the URL (ORM Leak).
Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections.
Finally, the username is used in a LIKE statement, allowing people to log in with % instead of their username.
Details
ORM Leak
When adding parameters to the URL, they are automatically included in an SQL LIKE statement (depending on the par...
Advisory GHSA-58vj-cv5w-v4v6 references a vulnerability in the following Go modules:
Description:
Security Advisory: Multiple Vulnerabilities in Navidrome
Summary
Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like
password=...
in the URL (ORM Leak).Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections.
Finally, the username is used in a
LIKE
statement, allowing people to log in with%
instead of their username.Details
ORM Leak
When adding parameters to the URL, they are automatically included in an SQL
LIKE
statement (depending on the par...References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: