Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8xpj-9j9g-fc9r

Опубликовано: 08 апр. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

SQL Injection in elide-datastore-aggregation

Impact

When leveraging the following together:

  • Elide Aggregation Data Store for Analytic Queries
  • Parameterized Columns (A column that requires a client provided parameter)
  • A parameterized column of type TEXT

There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters.

Patches

A fix is provided in Elide 6.1.4.

Workarounds

The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

com.yahoo.elide:elide-datastore-aggregation

maven
Затронутые версииВерсия исправления

= 6.1.3

6.1.4

EPSS

Процентиль: 59%
0.00378
Низкий

8.1 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.1
nvd
почти 4 года назад

Elide is a Java library that lets you stand up a GraphQL/JSON-API web service with minimal effort. When leveraging the following together: Elide Aggregation Data Store for Analytic Queries, Parameterized Columns (A column that requires a client provided parameter), and a parameterized column of type TEXT. There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters. A fix is provided in Elide 6.1.4. The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameteriz

EPSS

Процентиль: 59%
0.00378
Низкий

8.1 High

CVSS3

Дефекты

CWE-89