CVE-2025-50184
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-26

Last updated on: 2025-07-29

Assigner: GitHub, Inc.

Description
DbGate is cross-platform database manager. In versions 6.4.3-premium-beta.5 and below, DbGate is vulnerable to a directory traversal flaw. The file parameter is not properly restricted to the intended uploads directory. As a result, the endpoint that lists files within the upload directory can be manipulated to access arbitrary files on the system. By supplying a crafted path to the file parameter, an attacker can read files outside the upload directory, potentially exposing sensitive system-level data. This is fixed in version 6.4.3-beta.8.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-26
Last Modified
2025-07-29
Generated
2026-05-07
AI Q&A
2025-07-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
dbgate dbgate 6.4.3-premium-beta.5
dbgate dbgate 6.4.2-alpine
dbgate dbgate 6.4.3-beta.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-29 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a directory traversal flaw in DbGate versions 6.4.3-premium-beta.5 and below. The 'file' parameter used by the endpoint that lists files in the uploads directory is not properly restricted. An attacker can manipulate this parameter by including crafted path traversal sequences (like '../') to access files outside the intended uploads directory. This allows reading arbitrary files on the system, potentially exposing sensitive data. [1, 2]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with valid authorization to read arbitrary files on the system outside the uploads directory. This can lead to exposure of sensitive system-level files, such as password files, configuration files, or other confidential data, which can compromise system security and privacy. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious HTTP GET requests to the uploads endpoint that include directory traversal patterns in the 'file' parameter, such as sequences containing '../' or encoded equivalents like '%2f..%2f'. For example, you can search your web server logs for requests matching patterns like '/uploads/get?file=../../'. A sample command to detect such attempts in Apache or Nginx logs could be: grep -E 'GET /uploads/get\?file=.*\.\./' /var/log/nginx/access.log. Additionally, inspecting for requests with encoded traversal sequences can be done with: grep -i '%2f..%2f' /var/log/nginx/access.log. Network intrusion detection systems (NIDS) can also be configured to alert on such patterns. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading DbGate to version 6.4.3-beta.8 or later, where the vulnerability is fixed by validating the 'file' parameter to reject any input containing '..', '/' or '\\' substrings. If upgrading is not immediately possible, implement input validation or filtering on the server side to block requests with directory traversal patterns in the 'file' parameter. Additionally, restrict access to the uploads endpoint to authorized users only, and monitor logs for suspicious access attempts. Applying web application firewall (WAF) rules to block directory traversal payloads can also help mitigate exploitation. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart