ORM Injection
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
In this post is explained how it's possible to make a Django ORM vulnerable by using for example a code like:
Note how all the request.data (which will be a json) is directly passed to filter objects from the database. An attacker could send unexpected filters in order to leak more data than expected from it.
Examples:
Login: In a simple login try to leak the passwords of the users registered inside of it.
It's possible to brute-force the password until it's leaked.
Relational filtering: It's possible to traverse relations in order to leak information from columns that weren't even expected to be used in the operation. For example, if it's possible to leak articles created by a user withe these relations: Article(created_by
) -[1..1]-> Author (user
) -[1..1]-> User(password
).
It's possible to find the password of all the users that have created an article
Many-to-many relational filtering: In the previous example we couldn't find passwords of users that haven't created an article. However, following other relationships this is possible. For example: Article(created_by
) -[1..1]-> Author(departments
) -[0..*]-> Department(employees
) -[0..*]-> Author(user
) -[1..1]-> User(password
).
In this case we can find all the users in the departments of users that have created articles and then leak their passwords (in the previous json we are just leaking the usernames but then it's possible to leak the passwords).
Abusing Django Group and Permission many-to-may relations with users: Moreover, the AbstractUser model is used to generate users in Django and by default this model has some many-to-many relationships with the Permission and Group tables. Which basically is a default way to access other users from one user if they are in the same group or share the same permission.
Bypass filter restrictions: The same blogpost proposed to bypass the use of some filtering like articles = Article.objects.filter(is_secret=False, **request.data)
. t's possible to dump articles that have is_secret=True because we can loop back from a relationship to the Article table and leak secret articles from non secret articles because the results are joined and the is_secret field is checked in the non secret article while the data is leaked from the secret article.
Abusing relationships it's possible to bypass even filters meant to protect the data shown.
Error/Time based via ReDoS: In the previous examples it was expected to have different responses if the filtering worked or not to use that as oracle. But it could be possible that some action is done in the database and the response is always the same. In this scenario it could be possible to make the database error to get a new oracle.
From te same post regarding this vector:
SQLite: Doesn't have a regexp operator by default (require loading a third-party extension)
PostgreSQL: Doesn't have a default regex timeout and it's less prone to backtracking
MariaDB: Doesn't have a regex timeout
The following are tricks extracted from this post.
Full find control:
It's possible to see that the whole javascript body is passed to prisma to perform queries.
In the example from the original post, this would check all the posts createdBy someone (each post is created by someone) returning also the user info of that someone (username, password...)
The following one selects all the posts created by someone with a password and wil return the password:
Full where clause control:
Let's take a look to this where the attack can control the where
clause:
It's possible to filter the password of users directly like:
Using operations like startsWith
it's possible to leak information.
Many-to-many relational filtering bypassing filtering:
It's possible to leak not published articles by lopping back to the many-to-many relationships between Category
-[*..*]-> Article
:
It's also possible to leak all the users abusing some loop back many-to-many relationships:
Error/Timed queries: In the original post you can read an very extensive set of tests performed in order to find the optimal payload to leak information with a time based payload. This is:
Where the {CONTAINS_LIST}
is a list with 1000 strings to make sure the response is delayed when the correct leak is found.
These tricks where found in this post.
Note that Ransack 4.0.0.0 now enforce the use of explicit allow list for searchable attributes and associations.
Vulnerable example:
Note how the query will be defined by the parameters sent by the attacker. It was possible to for example brute-force the reset token with:
By brute-forcing and potentially relationships it was possible to leak more data from a database.
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)