CVE-2021-3860

8.8 HIGH

📋 TL;DR

CVE-2021-3860 is a blind SQL injection vulnerability in JFrog Artifactory Enterprise+ deployments that allows low-privileged authenticated users to execute arbitrary SQL queries. This can lead to data theft, data manipulation, or potential privilege escalation. Only Enterprise+ deployments of JFrog Artifactory before version 7.25.4 are affected.

💻 Affected Systems

Products:
  • JFrog Artifactory Enterprise+
Versions: All versions before 7.25.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Enterprise+ deployments; Community and Pro editions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including exfiltration of sensitive data, privilege escalation to administrative access, and potential remote code execution through database functions.

🟠

Likely Case

Data exfiltration from the Artifactory database including user credentials, repository metadata, and artifact information.

🟢

If Mitigated

Limited impact if proper network segmentation, database permissions, and monitoring are in place, though SQL injection could still be attempted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated low-privilege user access. Public proof-of-concept demonstrates blind SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.25.4 and later

Vendor Advisory: https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection

Restart Required: Yes

Instructions:

1. Backup Artifactory configuration and data. 2. Download Artifactory version 7.25.4 or later from JFrog. 3. Follow JFrog's upgrade documentation for your deployment type. 4. Restart Artifactory services after upgrade.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Artifactory to only trusted users and systems

Database Permission Reduction

all

Review and reduce database user permissions for Artifactory application accounts

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at the application layer
  • Deploy a web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Artifactory version via web interface or system properties. Vulnerable if version < 7.25.4 and Enterprise+ deployment.

Check Version:

curl -u admin:password http://artifactory-host:port/artifactory/api/system/version

Verify Fix Applied:

Confirm Artifactory version is 7.25.4 or later and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by specific API calls
  • Artifactory access logs showing suspicious parameter values

Network Indicators:

  • Unusual database connection patterns from Artifactory hosts
  • Large data transfers from database servers

SIEM Query:

source="artifactory" AND (url="*sql*" OR parameters="*' OR *" OR parameters="*;--*" OR parameters="*UNION*" OR parameters="*SELECT*" OR parameters="*INSERT*" OR parameters="*UPDATE*")

🔗 References

📤 Share & Export