Lucene search

K
rubygemsRubySecRUBY:BLAZER-2022-29498
HistoryApr 19, 2022 - 9:00 p.m.

SQL injection for certain queries with variables

2022-04-1921:00:00
RubySec
github.com
20
sql injection
variable modification
data sourceescaping
string literal
blazer
arbitrary queries
write permissions

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

For some queries, specific variable values can modify the query
rather than just the variable. This can occur if:

  1. the query’s data source uses different escaping than the Rails database OR
  2. the query has a variable inside a string literal

Since Blazer is designed to run arbitrary queries, the impact will typically be low.
Users cannot run any queries they could not have already run. However, an attacker
could get a user to run a query they would not have normally run. If the data source
has write permissions, this could include modifying data in some cases.

Affected configurations

Vulners
Node
rubyblazerRange2.6.0
VendorProductVersionCPE
rubyblazer*cpe:2.3:a:ruby:blazer:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Related for RUBY:BLAZER-2022-29498