GHSA-7vm2-j586-vcvc: SurrealDB is Vulnerable to Unauthorized Data Exposure via LIVE Query Subscriptions
LIVE SELECT
statements are used to capture changes to data within a table in real time. Documents included in WHERE
conditions and DELETE
notifications were not properly reduced to respect the querying user’s security context. Instead the leaked documents reflect the context of the user triggering the notification.
This allows a record or guest user with permissions to run live query subscriptions on a table to observe unauthorised records within the same table, when another user is altering or deleting these records, bypassing access controls.
References
- github.com/advisories/GHSA-7vm2-j586-vcvc
- github.com/surrealdb/surrealdb
- github.com/surrealdb/surrealdb/commit/d81169a06b89f0c588134ddf2d62eeb8d5e8fd0c
- github.com/surrealdb/surrealdb/pull/6247
- github.com/surrealdb/surrealdb/security/advisories/GHSA-7vm2-j586-vcvc
- surrealdb.com/docs/surrealql/statements/live
Code Behaviors & Features
Detect and mitigate GHSA-7vm2-j586-vcvc with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →