Learn about CVE-2022-36084, a critical vulnerability in cruddl software versions prior to 2.7.0 and 3.0.2. Understand the impact, technical details, and mitigation steps to secure your systems.
This article provides details about CVE-2022-36084, a vulnerability affecting cruddl software versions prior to 2.7.0 and 3.0.2. The vulnerability allows attackers to inject arbitrary AQL queries when using
@flexSearchFulltext
in schemas.
Understanding CVE-2022-36084
This section covers what CVE-2022-36084 entails, its impact, technical details, and mitigation strategies.
What is CVE-2022-36084?
cruddl, a software for building a GraphQL API for databases, is vulnerable to AQL injection through the use of
@flexSearchFulltext
in schemas. This allows attackers with READ
permissions to execute arbitrary AQL queries on ArangoDB.
The Impact of CVE-2022-36084
cruddl versions prior to 2.7.0 and 3.0.2 are susceptible to this critical vulnerability. Attackers exploiting this issue can compromise confidentiality, integrity, and availability of affected systems.
Technical Details of CVE-2022-36084
This section delves into the specifics of the vulnerability including its description, affected systems, and exploitation mechanism.
Vulnerability Description
cruddl versions between 1.1.0 and 2.7.0 / 3.0.2 are vulnerable to AQL injection. If
@flexSearchFulltext
is used in schemas, attackers can inject and execute AQL queries via ArangoDB.
Affected Systems and Versions
cruddl versions >= 1.1.0 and < 2.7.0 / < 3.0.2 are impacted. Schemas utilizing
@flexSearchFulltext
are at risk, while those without this feature are not affected.
Exploitation Mechanism
Attackers need
READ
permissions to a root entity type with @flexSearchFulltext
to exploit the vulnerability. By injecting AQL queries, they can manipulate the database.
Mitigation and Prevention
This section outlines immediate steps to remediate the vulnerability and long-term security practices.
Immediate Steps to Take
Users should update cruddl to versions 2.7.0 or 3.0.2 to patch the vulnerability. As a temporary workaround, removing
@flexSearchFulltext
from schemas can mitigate the risk.
Long-Term Security Practices
Implement secure coding practices, regularly update software, and conduct security audits to prevent future vulnerabilities.
Patching and Updates
Stay informed about security advisories and promptly apply patches. Regularly monitor for updates and security recommendations.