{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T20:22:34.613","vulnerabilities":[{"cve":{"id":"CVE-2022-24827","sourceIdentifier":"security-advisories@github.com","published":"2022-04-11T21:15:08.470","lastModified":"2024-11-21T06:51:11.173","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Elide is a Java library that lets you stand up a GraphQL/JSON-API web service with minimal effort. When leveraging the following together: Elide Aggregation Data Store for Analytic Queries, Parameterized Columns (A column that requires a client provided parameter), and a parameterized column of type TEXT. There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters. A fix is provided in Elide 6.1.4. The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns."},{"lang":"es","value":"Elide es una biblioteca de Java que permite poner en marcha un servicio web GraphQL/JSON-API con un esfuerzo mínimo. Cuando es aprovechado lo siguiente: Elide Aggregation Data Store for Analytic Queries, Parameterized Columns (Una columna que requiere un parámetro proporcionado por el cliente), y una columna parametrizada de tipo TEXT. Se presenta la posibilidad de que un pirata informático proporcione una consulta cuidadosamente diseñada que omita los filtros de autorización del lado del servidor mediante una inyección SQL. Un parche reciente de Elide versión 6.1.2 permitía incluir el carácter \"-\" en las columnas de tipo TEXTO parametrizadas. Este carácter puede interpretarse como comentarios SQL (\"--\") y permitir al atacante eliminar la cláusula WHERE de la consulta generada y omitir los filtros de autorización. En Elide versión 6.1.4 es proporcionada una corrección. La vulnerabilidad sólo se presenta para columnas parametrizadas de tipo TEXT y sólo para consultas analíticas (el CRUD no está afectado). Las mitigaciones incluyen el aprovechamiento de un tipo diferente de columna parametrizada (TIEMPO, DINERO, etc.) o no aprovechar las columnas parametrizadas"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elide:elide:6.1.3:*:*:*:*:*:*:*","matchCriteriaId":"5969EC0D-4B5C-40A4-9E57-A5496661F57B"}]}]}],"references":[{"url":"https://github.com/yahoo/elide/pull/2581","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/yahoo/elide/releases/tag/6.1.4","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/yahoo/elide/pull/2581","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/yahoo/elide/releases/tag/6.1.4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}