Skip to content

SQL Injection in the PackageSearch GraphiQL resolver

Critical
arthurzam published GHSA-45jr-w89p-c843 Apr 4, 2023

Package

Soko (Gentoo)

Affected versions

< 1.0.3

Patched versions

1.0.3

Description

Impact

The GraphiQL resolver PackageSearch, implemented in pkg/api/graphql/resolvers/resolver.go, is affected by a SQL injection via the searchTerm parameter. As a result, unauthenticated attackers can execute arbitrary SQL queries on https://packages.gentoo.org/. It was also demonstrated that primitive was enough to gain code execution in the context of the PostgreSQL container.

Patches

  • The issue was addressed in 428b119 using prepared statements to interpolate user-controlled data in SQL queries.

References

Severity

Critical
9.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVE ID

No known CVE

Weaknesses