Impact
The vulnerability is a SQL injection in the Rucio FilterEngine that allows any authenticated user to supply attacker‑controlled keys and values to the DID search API. When the backend database is Oracle, these values are embedded directly into a raw SQL fragment created with ``sqlalchemy.text()`` and Python string formatting, bypassing parameterization. This flaw enables the execution of arbitrary SQL statements, giving an attacker full access to the database, including tables that store authentication tokens, password hashes, and all managed data identifiers.
Affected Systems
Vulnerable versions of the Rucio portal include releases starting with 1.27.0 up to, but not including, 35.8.5, and also the isolated revision points 38.5.5, 39.4.2, and 40.1.1. The issue is confined to Oracle deployments that use the default json_meta plugin; PostgreSQL and MySQL deployments are unaffected.
Risk and Exploitability
This flaw carries a CVSS score of 9.4, indicating critical severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated session, and is most likely carried out via a crafted HTTP GET request to the DID search endpoint. Successful exploitation allows the attacker to read, modify, or delete any data in the database, effectively compromising the entire system.
OpenCVE Enrichment
Github GHSA