Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6921 | cruddl is software for creating a GraphQL API for a database, using the GraphQL SDL to model a schema. If cruddl starting with version 1.1.0 and prior to versions 2.7.0 and 3.0.2 is used to generate a schema that uses `@flexSearchFulltext`, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB. Schemas that do not use `@flexSearchFulltext` are not affected. The attacker needs to have `READ` permission to at least one root entity type that has `@flexSearchFulltext` enabled. The issue has been fixed in version 3.0.2 and in version 2.7.0 of cruddl. As a workaround, users can temporarily remove `@flexSearchFulltext` from their schemas. |
Github GHSA |
GHSA-qm4w-4995-vg7f | cruddl vulnerable to ArangoDB Query Language (AQL) injection through flexSearch |
Wed, 23 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T17:12:43.338Z
Reserved: 2022-07-15T00:00:00.000Z
Link: CVE-2022-36084
Updated: 2024-08-03T09:52:00.604Z
Status : Modified
Published: 2022-09-08T22:15:08.713
Modified: 2024-11-21T07:12:20.937
Link: CVE-2022-36084
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA