CVE-2022-23510: @cubejs-backend/api-gateway row level security bypass
7.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.06121%
CWE
Published
12/12/2022
Updated
1/28/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @cubejs-backend/api-gateway | npm | = 0.31.23 | 0.31.24 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key elements: 1) The sqlRunner method that executed raw SQL without applying row-level security filters from Cube's modeling layer. 2) The POST /v1/sql-runner endpoint that exposed this functionality to authenticated users. The security bypass is evident in the commit f1140de which completely removed these components, and the vulnerability description explicitly states this endpoint bypassed security contexts. The diff shows removal of both the route registration and sqlRunner method implementation, confirming their role in the vulnerability.