CVE-2021-3860
📋 TL;DR
CVE-2021-3860 is a blind SQL injection vulnerability in JFrog Artifactory Enterprise+ deployments that allows low-privileged authenticated users to execute arbitrary SQL queries. This can lead to data theft, data manipulation, or potential privilege escalation. Only Enterprise+ deployments of JFrog Artifactory before version 7.25.4 are affected.
💻 Affected Systems
- JFrog Artifactory Enterprise+
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including exfiltration of sensitive data, privilege escalation to administrative access, and potential remote code execution through database functions.
Likely Case
Data exfiltration from the Artifactory database including user credentials, repository metadata, and artifact information.
If Mitigated
Limited impact if proper network segmentation, database permissions, and monitoring are in place, though SQL injection could still be attempted.
🎯 Exploit Status
Exploit requires authenticated low-privilege user access. Public proof-of-concept demonstrates blind SQL injection techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.25.4 and later
Vendor Advisory: https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection
Restart Required: Yes
Instructions:
1. Backup Artifactory configuration and data. 2. Download Artifactory version 7.25.4 or later from JFrog. 3. Follow JFrog's upgrade documentation for your deployment type. 4. Restart Artifactory services after upgrade.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to Artifactory to only trusted users and systems
Database Permission Reduction
allReview and reduce database user permissions for Artifactory application accounts
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries at the application layer
- Deploy a web application firewall (WAF) with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Check Artifactory version via web interface or system properties. Vulnerable if version < 7.25.4 and Enterprise+ deployment.
Check Version:
curl -u admin:password http://artifactory-host:port/artifactory/api/system/version
Verify Fix Applied:
Confirm Artifactory version is 7.25.4 or later and test SQL injection attempts are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL query patterns in database logs
- Multiple failed authentication attempts followed by specific API calls
- Artifactory access logs showing suspicious parameter values
Network Indicators:
- Unusual database connection patterns from Artifactory hosts
- Large data transfers from database servers
SIEM Query:
source="artifactory" AND (url="*sql*" OR parameters="*' OR *" OR parameters="*;--*" OR parameters="*UNION*" OR parameters="*SELECT*" OR parameters="*INSERT*" OR parameters="*UPDATE*")
🔗 References
- http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html
- https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection
- http://packetstormsecurity.com/files/177162/JFrog-Artifactory-SQL-Injection.html
- https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection