Headline
GHSA-qm4w-4995-vg7f: cruddl vulnerable to ArangoDB Query Language (AQL) injection through flexSearch
Impact
If a vunerable version of cruddl is used to generate a schema that uses @flexSearchFulltext
, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB.
Schemas that do not use @flexSearchFulltext
are not affected.
The attacker needs to have READ
permission to at least one root entity type that has @flexSearchFulltext
enabled.
Patches
The issue has been fixed in version 3.0.2 and in version 2.7.0 of cruddl.
Workarounds
Users can temporarily remove @flexSearchFulltext
from their schemas before they can update cruddl.
For more information
If you have any questions or comments about this advisory:
- Open an issue in cruddl
- Email us at security@aeb.com
Impact
If a vunerable version of cruddl is used to generate a schema that uses @flexSearchFulltext, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB.
Schemas that do not use @flexSearchFulltext are not affected.
The attacker needs to have READ permission to at least one root entity type that has @flexSearchFulltext enabled.
Patches
The issue has been fixed in version 3.0.2 and in version 2.7.0 of cruddl.
Workarounds
Users can temporarily remove @flexSearchFulltext from their schemas before they can update cruddl.
For more information
If you have any questions or comments about this advisory:
- Open an issue in cruddl
- Email us at security@aeb.com
References
- GHSA-qm4w-4995-vg7f
- https://nvd.nist.gov/vuln/detail/CVE-2022-36084
- AEB-labs/cruddl#253
- AEB-labs/cruddl@13b9233
Related news
cruddl is software for creating a GraphQL API for a database, using the GraphQL SDL to model a schema. If cruddl starting with version 1.1.0 and prior to versions 2.7.0 and 3.0.2 is used to generate a schema that uses `@flexSearchFulltext`, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB. Schemas that do not use `@flexSearchFulltext` are not affected. The attacker needs to have `READ` permission to at least one root entity type that has `@flexSearchFulltext` enabled. The issue has been fixed in version 3.0.2 and in version 2.7.0 of cruddl. As a workaround, users can temporarily remove `@flexSearchFulltext` from their schemas.