Miggo Logo

CVE-2020-5289: Read permissions not enforced for client provided filter expressions in Elide.

6.8

CVSS Score
3.1

Basic Information

EPSS Score
0.54789%
Published
3/30/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.yahoo.elide:elide-coremaven< 4.5.144.5.14

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing ReadPermission enforcement during filter expression processing. The fix introduced EnforceJoinFilterExpressionVisitor to validate() field accessibility, and modified RequestScope.getLoadFilterExpression to use it. The original implementations of these functions lacked the permission checks, as evidenced by the PR's focus on adding visitor-based enforcement and refactoring filter construction logic. The high confidence comes from the explicit security-focused changes in the referenced pull request and commit messages.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t It is possi*l* *or *n **v*rs*ry to "*u*ss *n* ****k" t** v*lu* o* * mo**l *i*l* t**y *o not **v* ****ss to *ssumin* t**y **n r*** *t l**st on* ot**r *i*l* in t** mo**l. T** **v*rs*ry **n *onstru*t *ilt*r *xpr*ssions *or *n in****ssi*l* *i

Reasoning

T** vuln*r**ility st*mm** *rom missin* R***P*rmission *n*or**m*nt *urin* *ilt*r *xpr*ssion pro**ssin*. T** *ix intro*u*** `*n*or**Join*ilt*r*xpr*ssionVisitor` to `v*li**t*()` *i*l* ****ssi*ility, *n* mo*i*i** `R*qu*stS*op*.**tLo***ilt*r*xpr*ssion` to