Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Rucio SQL injection in postgres_meta DID search path compromises PostgreSQL metadata database
Vulnerability Description
### Summary A SQL injection vulnerability exists in Rucio versions 1.30.0 and later before 35.8.5, 38.5.5, 39.4.2, and 40.1.1, in `FilterEngine.create_postgres_query()`. This allows any authenticated Rucio user to execute arbitrary SQL against the PostgreSQL metadata database through the DID search endpoint (`GET /dids/<scope>/dids/search`). When the `postgres_meta` metadata plugin is configured, attacker-controlled filter keys and values are interpolated directly into raw SQL strings via Python `.format()`, then passed to `psycopg3`'s `sql.SQL()` which treats the string as trusted SQL syntax. Depending on the database privileges assigned to the service account, exploitation can expose sensitive tables, modify or delete metadata, access server-side files, or achieve code execution through PostgreSQL features such as COPY ... FROM PROGRAM. This issue affects deployments that explicitly use the postgres_meta metadata plugin. This vulnerability has been fixed in versions 35.8.5, 38.5.5, 39.4.2, and 40.1.1.
CVSS Information
N/A
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Vulnerability Title
Rucio SQL注入漏洞
Vulnerability Description
Rucio是rucio开源的一个科学数据管理工具。 Rucio存在SQL注入漏洞,该漏洞源于FilterEngine.create_postgres_query方法中SQL注入,可能导致任何经过身份验证的Rucio用户通过DID搜索端点对PostgreSQL元数据数据库执行任意SQL,暴露敏感表、修改或删除元数据、访问服务器端文件或通过PostgreSQL功能实现代码执行。
CVSS Information
N/A
Vulnerability Type
N/A