Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field
Vulnerability Description
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack is a single HTTP POST to /mutate?commitNow=true containing a crafted cond field in an upsert mutation. The cond value is concatenated directly into a DQL query string via strings.Builder.WriteString after only a cosmetic strings.Replace transformation. No escaping, parameterization, or structural validation is applied. An attacker injects an additional DQL query block into the cond string, which the DQL parser accepts as a syntactically valid named query block. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
数据查询逻辑中特殊元素的不当中和
Vulnerability Title
Dgraph 安全漏洞
Vulnerability Description
Dgraph是Dgraph开源的一个具有图形后端的水平可扩展分布式 GraphQL 数据库。 Dgraph 25.3.3之前版本存在安全漏洞,该漏洞源于upsert突变中cond字段未进行转义或参数化,可能导致未认证攻击者读取数据库全部数据。
CVSS Information
N/A
Vulnerability Type
N/A