Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1naDlmLTZ4bTItYzRqMs4AA9zl
SurrealDB vulnerable to Improper Authentication when Changing Databases as Scope User
Authentication would not be properly validated when an already authenticated scope user would use the use
method or USE
clause to switch working databases in a session. If there was a user record in the new database with identical record identifier as the original record that the user authenticated with in the original database, this could result in the user being able to perform actions under the identity of the unrelated user in the new database. This issue does not affect system users at any level.
By default, record identifiers are randomly generated with sufficient complexity to prevent the identifier collision required to trigger this issue. However, the issue may trigger in situations where multiple databases in the same SurrealDB instance are using explicitly defined or incremental record identifiers to identify users on an identically named table.
Impact
Under the circumstances described above, a user who has an authenticated session as a scope user in a database could become authorized to query data under the identity of a specific scope user associated with an identical record identifier in a different database within the same SurrealDB instace if the PERMISSIONS
clause would allow it due to relying exclusively on the $auth
parameter, which would point to the impersonated user. The impact is limited to the single user with matching record identifier.
The impact of this issue is mitigated if the table PERMISSIONS
clause explicitly checks for an scope that only exists in the specific database (e.g. $scope = "production"
) or certain claims of the authentication token (e.g. $token.email = "[email protected]"
), both of which would remain unchanged in the session of the authenticated user after changing databases. Permissions will default to NONE
if there is no PERMISSIONS
clause, which also mitigates this impact of this issue.
Patches
- Version 1.5.4 and later are not affected by this issue.
- Version 2.0.0-alpha.6 and later will not be affected by this issue.
Workarounds
Users unable to update may want to ensure that table PERMISSIONS
clauses explicitly check that the $scope
parameter matches a scope that is uniquely named across databases in the same SurrealDB instance. Ensuring that record identifiers for users are automatically generated or explicitly generated to be unique across databases may also be sufficient to mitigate this issue, as the $auth
parameter will not link to any user record and any PERMISSIONS
clauses restricting authorization based on the authenticated user should fail to successfully evaluate.
References Permalink: https://github.com/advisories/GHSA-gh9f-6xm2-c4j2
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1naDlmLTZ4bTItYzRqMs4AA9zl
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 5 months ago
CVSS Score: 6.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Identifiers: GHSA-gh9f-6xm2-c4j2
References:
- https://github.com/surrealdb/surrealdb/security/advisories/GHSA-gh9f-6xm2-c4j2
- https://github.com/surrealdb/surrealdb/pull/4335
- https://github.com/surrealdb/surrealdb/commit/492f8378d57968dbdf5e63fad41b6ff59bba0b80
- https://github.com/advisories/GHSA-gh9f-6xm2-c4j2
Blast Radius: 13.9
Affected Packages
cargo:surrealdb-core
Dependent packages: 4Dependent repositories: 0
Downloads: 193,722 total
Affected Version Ranges: <= 1.5.0
Fixed in: 1.5.1
All affected versions: 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.5.0
All unaffected versions: 1.5.1, 1.5.2, 1.5.3, 1.5.6, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4
cargo:surrealdb
Dependent packages: 42Dependent repositories: 158
Downloads: 256,478 total
Affected Version Ranges: >= 2.0.0-alpha.1, <= 2.0.0-alpha.5, <= 1.5.3
Fixed in: 2.0.0-alpha.6, 1.5.4
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.2.0, 1.2.2, 1.3.0, 1.3.1, 1.4.0, 1.4.2, 1.5.0, 1.5.1, 1.5.2, 1.5.3
All unaffected versions: 1.5.4, 1.5.5, 1.5.6, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4