vendor:
GraphQL Engine
by:
Dolev Farhi
8.8
CVSS
HIGH
Local File Inclusion (LFI)
98
CWE
Product Name: GraphQL Engine
Affected Version From: 1.3.3
Affected Version To: 1.3.3
Patch Exists: YES
Related CWE: N/A
CPE: a:hasura:graphql-engine
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu
2021
Hasura GraphQL 1.3.3 – Local File Read
This exploit allows an attacker to read files from the server by exploiting a vulnerability in Hasura GraphQL 1.3.3. The exploit uses a SQL injection to read files from the server. The exploit is written in Python and uses the requests library to send a POST request to the Hasura GraphQL endpoint. The payload contains a SQL query that reads the file specified in the READ_FILE variable. The exploit then prints the contents of the file.
Mitigation:
Upgrade to the latest version of Hasura GraphQL and ensure that all security patches are applied.