CVE-2022-24407
📋 TL;DR
CVE-2022-24407 is a SQL injection vulnerability in Cyrus SASL authentication library. It allows attackers to inject arbitrary SQL commands via unescaped passwords in SQL INSERT/UPDATE statements. Systems using Cyrus SASL with SQL plugin authentication are affected.
💻 Affected Systems
- Cyrus SASL
📦 What is this software?
Communications Cloud Native Core Console by Oracle
View all CVEs affecting Communications Cloud Native Core Console →
Communications Cloud Native Core Network Function Cloud Native Environment by Oracle
View all CVEs affecting Communications Cloud Native Core Network Function Cloud Native Environment →
Communications Cloud Native Core Security Edge Protection Proxy by Oracle
View all CVEs affecting Communications Cloud Native Core Security Edge Protection Proxy →
Cyrus Sasl by Cyrusimap
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Full database compromise leading to authentication bypass, data exfiltration, or complete system takeover via SQL injection.
Likely Case
Authentication bypass allowing unauthorized access to services using Cyrus SASL for authentication.
If Mitigated
Limited impact if SQL plugin not used or proper input validation exists at application layer.
🎯 Exploit Status
Exploitation requires ability to set or modify passwords. SQL injection is well-understood attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.28
Vendor Advisory: https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
Restart Required: Yes
Instructions:
1. Download Cyrus SASL 2.1.28 or later from official repository. 2. Compile and install following standard build procedures. 3. Restart all services using Cyrus SASL.
🔧 Temporary Workarounds
Disable SQL plugin
linuxRemove or disable SQL authentication plugin if not required
Remove sql plugin from sasl configuration files
Comment out sql-related entries in /etc/sasl2/*.conf
Use alternative authentication
linuxSwitch to non-SQL authentication methods like LDAP or PAM
Configure saslauthd to use alternative backend
Update application authentication configuration
🧯 If You Can't Patch
- Implement strict input validation at application layer for all password inputs
- Use database permissions to limit SQL plugin account to minimal required privileges
🔍 How to Verify
Check if Vulnerable:
Check Cyrus SASL version: saslauthd -v or check installed package version
Check Version:
saslauthd -v 2>&1 | grep version || cyrus-sasl-config --version
Verify Fix Applied:
Verify version is 2.1.28 or higher and SQL plugin properly escapes passwords
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in database logs
- Failed authentication attempts with SQL syntax in password field
- Unexpected database queries from SASL process
Network Indicators:
- SQL injection patterns in authentication traffic
- Unusual authentication requests to SQL backend
SIEM Query:
source="database_logs" AND ("sql error" OR "syntax error") AND process="sasl"
🔗 References
- http://www.openwall.com/lists/oss-security/2022/02/23/4
- https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
- https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
- https://security.netapp.com/advisory/ntap-20221007-0003/
- https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
- https://www.debian.org/security/2022/dsa-5087
- https://www.oracle.com/security-alerts/cpujul2022.html
- http://www.openwall.com/lists/oss-security/2022/02/23/4
- https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
- https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
- https://security.netapp.com/advisory/ntap-20221007-0003/
- https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
- https://www.debian.org/security/2022/dsa-5087
- https://www.oracle.com/security-alerts/cpujul2022.html