Elide Java library is vulnerable to SQL Injection in elide-datastore-aggregation up to version 6.1.3. Attackers can bypass authorization filters by exploiting carefully crafted queries. Patch available in version 6.1.4.
Elide, a Java library, is vulnerable to SQL injection in the elide-datastore-aggregation component, impacting versions up to 6.1.3. This vulnerability allows attackers to bypass authorization filters through carefully crafted queries. The issue is fixed in version 6.1.4.
Understanding CVE-2022-24827
SQL Injection vulnerability in Elide library
What is CVE-2022-24827?
Elide, a Java library enabling GraphQL/JSON-API web services, is susceptible to SQL Injection in the elide-datastore-aggregation module. By exploiting this vulnerability, attackers can circumvent server-side authorization filters through malicious queries.
The Impact of CVE-2022-24827
The vulnerability poses a high risk, with a CVSS base score of 8.1. It affects confidentiality, integrity, and availability, allowing remote attackers to execute SQL injection attacks over the network without requiring privileges.
Technical Details of CVE-2022-24827
Details of the SQL Injection vulnerability
Vulnerability Description
The flaw arises when using Elide Aggregation Data Store for Analytic Queries with Parameterized Columns. A carefully crafted query with parameterized TEXT columns could permit SQL injection, enabling attackers to bypass server-side authorization filters.
Affected Systems and Versions
Elide versions up to 6.1.3 are impacted by this vulnerability.
Exploitation Mechanism
Attackers can exploit this issue by providing a malicious query that leverages textual columns, allowing them to bypass WHERE clauses in generated queries.
Mitigation and Prevention
Ways to mitigate the SQL injection vulnerability
Immediate Steps to Take
Upgrade to Elide version 6.1.4 to patch the security flaw. Alternatively, consider using non-TEXT parameterized columns or avoid the use of parameterized columns altogether.
Long-Term Security Practices
Regularly update software components and implement secure coding practices to prevent SQL injection vulnerabilities.
Patching and Updates
Ensure timely installation of security patches and updates to mitigate the risk of SQL injection attacks.