cvelist/2022/23xxx/CVE-2022-23510.json

96 lines
3.5 KiB
JSON
Raw Normal View History

2022-01-19 22:01:34 +00:00
{
2022-12-09 23:00:34 +00:00
"data_version": "4.0",
2022-01-19 22:01:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-23510",
2022-12-09 23:00:34 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2022-01-19 22:01:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-12-09 23:00:34 +00:00
"value": "cube-js is a headless business intelligence platform. In version 0.31.23 all authenticated Cube clients could bypass SQL row-level security and run arbitrary SQL via the newly introduced /v1/sql-runner endpoint. This issue has been resolved in version 0.31.24. Users are advised to either upgrade to 0.31.24 or to downgrade to 0.31.22. There are no known workarounds for this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "cube-js",
"product": {
"product_data": [
{
"product_name": "cube.js",
"version": {
"version_data": [
{
"version_value": "= 0.31.23",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/cube-js/cube.js/security/advisories/GHSA-6jqm-3c9g-pch7",
"refsource": "MISC",
"name": "https://github.com/cube-js/cube.js/security/advisories/GHSA-6jqm-3c9g-pch7"
},
{
"url": "https://github.com/cube-js/cube.js/commit/3c614674fed6ca17df08bbba8c835ef110167570",
"refsource": "MISC",
"name": "https://github.com/cube-js/cube.js/commit/3c614674fed6ca17df08bbba8c835ef110167570"
},
{
"url": "https://github.com/cube-js/cube.js/commit/f1140de508e359970ac82b50bae1c4bf152f6041",
"refsource": "MISC",
"name": "https://github.com/cube-js/cube.js/commit/f1140de508e359970ac82b50bae1c4bf152f6041"
}
]
},
"source": {
"advisory": "GHSA-6jqm-3c9g-pch7",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
2022-01-19 22:01:34 +00:00
}
]
}
}