This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: WhoDB (v0.45.0-) suffers from **Path Traversal**. π **Consequences**: Unauthenticated attackers can read **any** SQLite3 database on the host.β¦
π‘οΈ **CWE-35**: Improper Limitation of a Pathname to a Restricted Directory. π **Flaw**: No validation on database filenames. π **Result**: Allows accessing arbitrary files outside intended scope.
Q3Who is affected? (Versions/Components)
π’ **Vendor**: clidey. π¦ **Product**: WhoDB. π **Affected**: Versions **0.45.0 and earlier**. π **Type**: Open-source data browser.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Privileges**: **Unauthenticated** access required. ποΈ **Data**: Can open **any** SQLite3 DB on the server. π **Scope**: Host system files exposed. π **Severity**: High Confidentiality & Integrity impact.