Skip to content

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in elide-datastore-aggregation

High
aklish published GHSA-8xpj-9j9g-fc9r Apr 8, 2022

Package

maven elide-datastore-aggregation (Maven)

Affected versions

= 6.1.3

Patched versions

6.1.4

Description

Impact

When leveraging the following together:

  • Elide Aggregation Data Store for Analytic Queries
  • Parameterized Columns (A column that requires a client provided parameter)
  • A parameterized column of type TEXT

There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters.

Patches

A fix is provided in Elide 6.1.4.

Workarounds

The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns.

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2022-24827

Weaknesses