Skip to content

NHibernate SQL injection vulnerability in discriminator mappings, static fields referenced in HQL, and some utilities

Moderate severity GitHub Reviewed Published Jul 6, 2024 in nhibernate/nhibernate-core • Updated Jul 9, 2024

Package

NHibernate (NuGet)

Affected versions

< 5.4.9
>= 5.5.0, < 5.5.2

Patched versions

5.4.9
5.5.2

Description

Impact

A SQL injection vulnerability exists in some types implementing ILiteralType.ObjectToSQLString. Callers of these methods are exposed to the vulnerability, which includes:

  • Mappings using inheritance with discriminator values:
    • The discriminator value could be written in the mapping in a way exploiting the vulnerability of the associated discriminator type, if that type is among the vulnerable ones.
    • The current culture settings for formatting the discriminator value type could be altered in a way resulting into SQL injections with the discriminator values.
  • HQL queries referencing a static field of the application.
  • Users of the SqlInsertBuilder and SqlUpdateBuilder utilities, calling their AddColumn overload taking a literal value. These overloads are unused by NHibernate but could be used by users referencing directly these utilities.
  • Any direct use of the ObjectToSQLString methods for building SQL queries on the user side.

Patches

Releases 5.4.9 and 5.5.2.

Workarounds

  • Ensure the application does not use the features listed above.
  • For discriminator usages, ensure the discriminator values in the mappings do not contain quotes for string discriminators. Furthermore, for types which ToString conversion can be altered to include SQL injections through adequate hacking of the current culture settings, either change for another type, or ensure the used values cannot allow culture exploits, or ensure the application performs sanity checks of the current culture settings. Types sensitive to culture include integers for negative values, dates, times and datetimes, floats and decimals.

References

References

Published to the GitHub Advisory Database Jul 8, 2024
Reviewed Jul 8, 2024
Published by the National Vulnerability Database Jul 8, 2024
Last updated Jul 9, 2024

Severity

Moderate
5.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2024-39677

GHSA ID

GHSA-fg4q-ccq8-3r5q

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.