CVE-2024-39909: SQL Injection in the KubeClarity REST API
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33796%
CWE
Published
7/12/2024
Updated
11/18/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/openclarity/kubeclarity/backend | go | < 0.0.0-20240711173334-1d1178840703 | 0.0.0-20240711173334-1d1178840703 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the use of fmt.Sprintf in line 79 of id_view.go to build SQL queries. The original code concatenated user-supplied values (params.FilterIDs) directly into the query string via string formatting, creating a classic SQL injection vector. The patch replaced this with parameterized placeholders (? = ?), confirming the vulnerability was caused by unsafe string interpolation in this function. The function's role in processing filter parameters for database queries directly aligns with the described attack vector via the packageID parameter.