Skip to main content

CVE-2022-31196: CWE-918: Server-Side Request Forgery (SSRF) in vran-dev databasir

Medium
Published: Fri Sep 02 2022 (09/02/2022, 19:45:13 UTC)
Source: CVE
Vendor/Project: vran-dev
Product: databasir

Description

Databasir is a database metadata management platform. Databasir <= 1.06 has Server-Side Request Forgery (SSRF) vulnerability. The SSRF is triggered by a sending a **single** HTTP POST request to create a databaseType. By supplying a `jdbcDriverFileUrl` that returns a non `200` response code, the url is executed, the response is logged (both in terminal and in database) and is included in the response. This would allow an attackers to obtain the real IP address and scan Intranet information. This issue was fixed in version 1.0.7.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:43:36 UTC

Technical Analysis

CVE-2022-31196 is a Server-Side Request Forgery (SSRF) vulnerability identified in the databasir platform, a database metadata management tool developed by vran-dev. The vulnerability affects databasir versions prior to 1.0.7. The issue arises when an attacker sends a specially crafted single HTTP POST request to create a new databaseType entity. This request includes a parameter named `jdbcDriverFileUrl` which is intended to point to a JDBC driver file URL. If the URL provided returns a non-200 HTTP response code, the databasir server executes the URL request, logs the response both in the terminal and in the database, and includes the response content in its own HTTP response. This behavior allows an attacker to leverage the server as a proxy to make arbitrary HTTP requests, potentially accessing internal network resources that are otherwise inaccessible externally. Through this SSRF, attackers can discover real IP addresses behind firewalls and scan intranet services, which may lead to further exploitation or reconnaissance. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery) and was publicly disclosed on September 2, 2022. The issue was resolved in databasir version 1.0.7 by presumably sanitizing or restricting the handling of the `jdbcDriverFileUrl` parameter to prevent unauthorized internal requests. No known exploits have been reported in the wild to date, but the vulnerability presents a medium severity risk due to its potential to facilitate internal network reconnaissance and indirect access to sensitive resources.

Potential Impact

For European organizations using databasir versions prior to 1.0.7, this SSRF vulnerability poses a significant risk to internal network confidentiality and security. Attackers exploiting this flaw can bypass perimeter defenses by making the vulnerable server perform HTTP requests to internal systems, potentially exposing sensitive metadata, internal IP addresses, and services that are not publicly accessible. This can lead to further targeted attacks such as lateral movement, data exfiltration, or exploitation of other internal vulnerabilities. Organizations in sectors with critical infrastructure, finance, healthcare, or government services are particularly at risk due to the sensitive nature of their internal networks and data. The vulnerability does not directly allow remote code execution or data modification but facilitates reconnaissance that can be a precursor to more severe attacks. The inclusion of response data in server logs and HTTP responses may also inadvertently leak sensitive internal information. Given the medium severity and the ease of exploitation through a single HTTP POST request without authentication requirements mentioned, the impact on confidentiality and network integrity is notable. Availability impact is limited as the vulnerability does not inherently cause denial of service.

Mitigation Recommendations

1. Immediate upgrade of databasir to version 1.0.7 or later is the primary mitigation step to ensure the vulnerability is patched. 2. If upgrading is not immediately feasible, implement network-level controls such as restricting outbound HTTP requests from the databasir server to only trusted external endpoints, preventing it from accessing internal network resources. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests containing the `jdbcDriverFileUrl` parameter or unusual URL patterns. 4. Monitor server logs for unusual or unexpected HTTP POST requests to the databaseType creation endpoint, especially those including external URLs or non-standard response codes. 5. Conduct internal network segmentation to limit the exposure of sensitive intranet services to servers running databasir. 6. Review and harden logging configurations to avoid sensitive internal information being included in HTTP responses or logs accessible to unauthorized users. 7. Implement strict input validation and URL whitelisting on any parameters that accept external URLs to prevent SSRF exploitation. 8. Educate development and security teams about SSRF risks and ensure secure coding practices are followed for URL handling in web applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf68aa

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:43:36 PM

Last updated: 7/30/2025, 3:44:45 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats