NIXPKGS-2026-1162
GitHub issue
published on
Permalink
CVE-2026-40342
10.0 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse ignored package firebird-emu
- @LeSuisse ignored
- @LeSuisse accepted
- @LeSuisse published on GitHub
Firebird: Path Traversal + Arbitrary File Write Leads to Remote Code Execution
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library's initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server's OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
References
-
https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-7pxc-h3rv-r257 x_refsource_CONFIRM
Ignored references (3)
-
https://github.com/FirebirdSQL/firebird/releases/tag/v5.0.4 x_refsource_MISC
-
https://github.com/FirebirdSQL/firebird/releases/tag/v4.0.7 x_refsource_MISC
-
https://github.com/FirebirdSQL/firebird/releases/tag/v3.0.14 x_refsource_MISC
Affected products
firebird
- ==< 3.0.14
- ==>= 5.0.0, < 5.0.4
- ==>= 4.0.0, < 4.0.7
Matching in nixpkgs
pkgs.firebird
SQL relational database management system
pkgs.firebird_3
SQL relational database management system
Package maintainers
-
@MarcWeber Marc Weber <marco-oweber@gmx.de>
-
@bbenno Benno Bielmeier <nix@bbenno.com>