Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-46163
HistoryJan 10, 2023 - 8:26 p.m.

CVE-2022-46163 travel-support-program vulnerable to data exfiltration via Ransack query injection

2023-01-1020:26:02
CWE-200
GitHub_M
www.cve.org
cve-2022-46163
travel support program
data exfiltration
ransack query injection
opensuse
tsp
sensitive user data
patch
character-by-character brute-force
database objects
search functionality
patch d22916275c51500b4004933ff1b0a69bc807b2b7
rails 5.0 migration

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

51.6%

Travel support program is a rails app to support the travel support program of openSUSE (TSP). Sensitive user data (bank account details, password Hash) can be extracted via Ransack query injection. Every deployment of travel-support-program below the patched version is affected. The travel-support-program uses the Ransack library to implement search functionality. In its default configuration, Ransack will allow for query conditions based on properties of associated database objects [1]. The *_start, *_end or *_cont search matchers [2] can then be abused to exfiltrate sensitive string values of associated database objects via character-by-character brute-force (A match is indicated by the returned JSON not being empty). A single bank account number can be extracted with <200 requests, a password hash can be extracted with ~1200 requests, all within a few minutes. The problem has been patched in commit d22916275c51500b4004933ff1b0a69bc807b2b7. In order to work around this issue, you can also cherry pick that patch, however it will not work without the Rails 5.0 migration that was done in #150, which in turn had quite a few pull requests it depended on.

CNA Affected

[
  {
    "vendor": "openSUSE",
    "product": "travel-support-program",
    "versions": [
      {
        "version": "< d22916275c51500b4004933ff1b0a69bc807b2b7",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

51.6%

Related for CVELIST:CVE-2022-46163