> On Dec 18, 2018, at 2:13 PM, Richard Hipp <d...@sqlite.org> wrote:
> 
> I am not aware of any other applications that deliberately run SQL
> from anonymous sources

In applications that use SQLite databases as a file format, couldn’t a 
malicious document be created that uses a trigger to run SQL that triggers an 
exploit when the document/database is edited? In other words:

1. Mallory creates or obtains some innocuous document.
2. Mallory uses something like the ’sqlite3’ tool to open the database and 
execute a CREATE TRIGGER statement whose trigger SQL exploits a vulnerability 
to do something nasty like remote code execution.
3. Mallory passes the document to Alice.
4. Alice opens the document and makes a change that causes SQLite to update a 
table in a way that activates the trigger.
5. The malicious SQL runs in the application process on Alice’s computer and 
does its business.

—Jens
_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to