Miggo Logo

GHSA-9722-9j67-vjcr: Improper Authorization in Select Permissions

6.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
10/8/2024
Updated
10/8/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
surrealdbrust< 2.0.42.0.4
surrealdb-corerust< 2.0.42.0.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from authorization checks being applied after data processing in multiple scenarios. Key issues included: 1) WHERE clause processing using raw field values before permission checks (check_where_condition), 2) SELECT VALUE/functions receiving unauthorized values during query preparation (Iterator::prepare), 3) Edge relationship handling not respecting field permissions (process_edge), and 4) Permission evaluation timing issues allowing data leakage through subsequent operations (check_permissions_table). The commit patches show fundamental changes to permission evaluation order and document processing stages, indicating these functions previously lacked proper authorization guards at critical points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u* to t** or**r in w*i** p*rmissions w*r* pro**ss**, som* st*t*m*nts, *ilt*rs *n* *omput*tions *oul* l*** to l**kin* *i*l* v*lu*s or r**or* *ont*nts to us*rs wit*out t** r*quir** p*rmissions. T*is ****vior *oul* ** tri***r** in *i***r*nt s**n*rios:

Reasoning

T** vuln*r**ility st*mm** *rom *ut*oriz*tion ****ks **in* *ppli** **t*r **t* pro**ssin* in multipl* s**n*rios. K*y issu*s in*lu***: *) W**R* *l*us* pro**ssin* usin* r*w *i*l* v*lu*s ***or* p*rmission ****ks (****k_w**r*_*on*ition), *) S*L**T V*LU*/*u