GHSA-6j7p-qjhg-9947

Suggest an improvement
Source
https://github.com/advisories/GHSA-6j7p-qjhg-9947
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-6j7p-qjhg-9947/GHSA-6j7p-qjhg-9947.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6j7p-qjhg-9947
Aliases
  • CVE-2026-29090
Published
2026-05-06T16:44:07Z
Modified
2026-05-08T18:34:56.469552Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
  • 9.0 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
Rucio has SQL Injection in FilterEngine PostgreSQL Query Builder via DID Search API
Details

Summary

A SQL injection vulnerability in FilterEngine.create_postgres_query allows any authenticated Rucio user to execute arbitrary SQL against the configured PostgreSQL metadata database through the DID search endpoint (GET /dids/<scope>/dids/search). When the external metadata plugin postgres_meta is configured, attacker-controlled filter keys and values are interpolated directly into raw SQL statements via Python str.format. This enables full database compromise including data exfiltration, data modification, and potential remote code execution via COPY ... FROM PROGRAM.

Details

Will follow in two weeks (2025-05-19).

Impact

Vulnerability type: SQL Injection (CWE-89)

Who is impacted:

  • Rucio deployments that have explicitly configured the postgres_meta metadata plugin.

What an attacker can do:

  • Data modification: PostgreSQL stacked queries enable arbitrary INSERT/UPDATE/DELETE operations.
  • Remote code execution: Via PostgreSQL's COPY ... FROM PROGRAM if the database user has superuser or pg_execute_server_program privileges.
  • File system access: Via COPY ... TO/FROM '/path' if filesystem permissions allow.

Further elevation when the same postgres database and access is used for metadata and for Rucio itself

  • Full database read access: Extract any table including identities (password hashes and salts), tokens (active authentication sessions), accounts (user enumeration), rse_settings (storage endpoint credentials), and rules (data management policies) could be extracted.
  • Password hash extraction: Combined with Rucio's use of single-iteration SHA-256 for password hashing (no KDF), extracted hashes can be cracked at GPU speed.
  • Authentication token theft: Active bearer tokens can be extracted and used for immediate session hijacking.

Required attacker privileges: Any authenticated Rucio user. Authentication tokens can be obtained via any supported method (userpass, x509, OIDC, SAML, SSH, GSS). No special roles or administrative permissions are required. The GET /dids/<scope>/dids/search endpoint is available to all authenticated users.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-06T16:44:07Z",
    "cwe_ids": [
        "CWE-89"
    ],
    "severity": "CRITICAL",
    "nvd_published_at": "2026-05-06T18:16:02Z"
}
References

Affected packages

PyPI / rucio

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.30.0
Fixed
35.8.5

Affected versions

1.*
1.30.0
1.30.1
1.30.2
1.30.3
1.30.4
1.30.5
1.30.6
1.30.7
1.30.8
1.31.0rc1
1.31.0rc2
1.31.0rc3
1.31.0
1.31.1
1.31.2
1.31.3
1.31.4
1.31.5
1.31.6
1.31.7
32.*
32.0.0rc1
32.0.0rc2
32.0.0
32.1.0
32.2.0
32.3.0
32.3.1
32.4.0
32.5.0
32.5.0.post1
32.5.1
32.6.0
32.6.0.post1
32.7.0
32.8.0
32.8.1
32.8.2
32.8.3
32.8.4
32.8.5
32.8.6
33.*
33.0.0rc1
33.0.0rc2
33.0.0rc3
33.0.0
33.1.0
33.2.0
33.2.1
33.3.0
33.4.0
33.4.0.post1
33.5.0
33.6.0
33.6.1
34.*
34.0.0rc1
34.0.0rc2
34.0.0
34.1.0
34.2.0
34.3.0
34.4.0
34.4.1
34.4.2
34.4.3
34.5.0
34.6.0
35.*
35.0.0rc1
35.0.0rc2
35.0.0
35.0.1
35.1.0
35.1.1
35.2.0
35.2.1
35.3.0
35.4.0
35.4.1
35.5.0
35.6.0
35.6.1
35.7.0
35.8.0
35.8.1
35.8.2
35.8.3
35.8.4

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-6j7p-qjhg-9947/GHSA-6j7p-qjhg-9947.json"

PyPI / rucio

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
36.0.0
Fixed
38.5.5

Affected versions

36.*
36.0.0
36.0.0.post1
36.0.0.post2
36.1.0
36.2.0
36.3.0
36.4.0
36.5.0
37.*
37.0.0rc1
37.0.0rc2
37.0.0rc3
37.0.0rc4
37.0.0
37.1.0
37.1.0.post1
37.2.0
37.3.0
37.4.0
37.5.0
37.6.0
37.7.0
37.7.1
38.*
38.0.0rc1
38.0.0rc2
38.0.0rc3
38.0.0
38.1.0
38.2.0
38.3.0
38.4.0
38.5.0
38.5.1
38.5.2
38.5.3
38.5.4

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-6j7p-qjhg-9947/GHSA-6j7p-qjhg-9947.json"

PyPI / rucio

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
39.0.0
Fixed
39.4.2

Affected versions

39.*
39.0.0
39.1.0
39.2.0
39.3.0
39.3.1
39.4.0
39.4.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-6j7p-qjhg-9947/GHSA-6j7p-qjhg-9947.json"

PyPI / rucio

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
40.0.0
Fixed
40.1.1

Affected versions

40.*
40.0.0
40.1.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-6j7p-qjhg-9947/GHSA-6j7p-qjhg-9947.json"