When leveraging the following together:
There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters.
A fix is provided in Elide 6.1.4.
The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns.
If you have any questions or comments about this advisory: * Open an issue in elide * Contact us in Discord
{ "nvd_published_at": "2022-04-11T21:15:00Z", "github_reviewed_at": "2022-04-08T22:43:17Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-89" ] }