CQL injection, encode CQL strings, use percent encoding
Description
CSP Request Details
1. Describe issue impact on business
Special characters like " \ / ^ * _ are not correctly handled resulting in CQL and SQL injection.
This may cause data loss or give illegal database access (read and write).
2. What institutions are affected? (field “Affected Institutions” in Jira to be populated)
Attackers don't publish which institutions they will attack.
3. What is the workaround if exists?
None.
4. What areas will be impacted by fix (i.e. what areas need to be retested)
SIP2
5. Brief explanation of technical implementation and the level of effort (in workdays) and technical risk (low/medium/high)
Use proper quoting and encoding. One workday. Low risk because standard quoting and encoding techniques are used.
6. Brief explanation of testing required and level of effort (in workdays). Provide test plan agreed with by QA Manager and PO.
Testing edge-sip2. One workday.
7. What is the roll back plan in case the fix does not work?
Use previous version.
CSP Rejection Details
None
Potential Workaround
None
Checklist
hideActivity
Show:
Oleksii Petrenko February 27, 2025 at 4:07 PM
Deployed
Craig McNally February 6, 2025 at 4:16 PM
, we still need to request approval for this to make it into QCSP10, and Ramsons CSP1. Can you please do so? Thanks!
Done
Details
Details
Assignee
Julian Ladisch
Julian LadischReporter
Julian Ladisch
Julian LadischPriority
Development Team
Volaris
Release
Quesnelia (R1 2024) Service Patch #10
RCA Group
Institution specific (Data)
CSP Approved
Yes
Affected Institution
GBV
TestRail: Cases
Open TestRail: Cases
TestRail: Runs
Open TestRail: Runs
Created January 29, 2025 at 1:40 PM
Updated March 5, 2025 at 4:31 PM
Resolved February 10, 2025 at 9:40 AM
TestRail: Cases
TestRail: Runs
To avoid CQL injection edge-sip2 needs to properly encode strings:
Put query string into quotes
Encode special CQL characters
Use percent encoding, not URL encoding, as required by RFC 3986 Section 2.3 https://datatracker.ietf.org/doc/html/rfc3986#section-2.3