If a vunerable version of cruddl is used to generate a schema that uses @flexSearchFulltext, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB.
Schemas that do not use @flexSearchFulltext are not affected.
The attacker needs to have READ permission to at least one root entity type that has @flexSearchFulltext enabled.
The issue has been fixed in version 3.0.2 and in version 2.7.0 of cruddl.
Users can temporarily remove @flexSearchFulltext from their schemas before they can update cruddl.
If you have any questions or comments about this advisory: * Open an issue in cruddl * Email us at security@aeb.com
{
"severity": "CRITICAL",
"github_reviewed": true,
"nvd_published_at": "2022-09-08T22:15:00Z",
"github_reviewed_at": "2022-09-16T17:43:10Z",
"cwe_ids": [
"CWE-74"
]
}