CVE-2022-36084
moderate-risk
Published 2022-09-08
cruddl is software for creating a GraphQL API for a database, using the GraphQL SDL to model a schema. If cruddl starting with version 1.1.0 and prior to versions 2.7.0 and 3.0.2 is used to generate a schema that uses `@flexSearchFulltext`, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB. Schemas that do not use `@flexSearchFulltext` are not affected. The attacker needs to have `READ` permission to at least one root entity type that has `@flexSearchFulltext` enabled. The issue has been fixed in version 3.0.2 and in version 2.7.0 of cruddl. As a workaround, users can temporarily remove `@flexSearchFulltext` from their schemas.
Do I need to act?
~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 1914e8897e99e429340f16716b2b2ca9de63162c, c4ecd89f010fc1b685792bcd544130ce8f5bc185
9
CVSS 9.9/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Cruddl
Affected Vendors
References (6)
41
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal