CVE-2023-7333

5.3 MEDIUM

📋 TL;DR

This CVE describes a SQL injection vulnerability in bluelabsio records-mover up to version 1.5.4, specifically in the Table Object Handler component. Attackers with local access can execute arbitrary SQL commands, potentially compromising data integrity and confidentiality. Users of records-mover versions 1.5.4 and earlier are affected.

💻 Affected Systems

Products:
  • bluelabsio records-mover
Versions: Up to and including version 1.5.4
Operating Systems: All platforms running records-mover
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Table Object Handler component; all installations using affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full database access, allowing data theft, modification, or deletion, and potentially privilege escalation through database operations.

🟠

Likely Case

Local user with malicious intent executes SQL commands to read, modify, or delete sensitive data within the application's database scope.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the local system's database operations without broader network compromise.

🌐 Internet-Facing: LOW - Attack requires local access, not remotely exploitable over the network.
🏢 Internal Only: MEDIUM - Local attackers (including malicious insiders or compromised accounts) can exploit this vulnerability to manipulate database content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - SQL injection vulnerabilities typically have straightforward exploitation paths once the vulnerable function is identified.

Exploitation requires local access to the system running records-mover; no public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.0

Vendor Advisory: https://github.com/bluelabsio/records-mover/releases/tag/v1.6.0

Restart Required: Yes

Instructions:

1. Stop any running records-mover processes. 2. Upgrade to version 1.6.0 using pip: 'pip install records-mover==1.6.0'. 3. Restart the application and verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local system access to trusted users only through proper authentication and authorization controls.

Database Input Validation

all

Implement additional input validation and parameterized queries in custom code that interacts with the Table Object Handler.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can execute records-mover commands locally.
  • Monitor database logs for unusual SQL queries originating from records-mover processes.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of records-mover: 'pip show records-mover' and verify if version is 1.5.4 or earlier.

Check Version:

pip show records-mover | grep Version

Verify Fix Applied:

After upgrading, run 'pip show records-mover' to confirm version 1.6.0 is installed and test application functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs from records-mover processes
  • Multiple failed SQL syntax attempts from application

Network Indicators:

  • N/A - Local vulnerability only

SIEM Query:

Search for database error logs containing SQL syntax errors from records-mover process IDs or unusual query patterns.

🔗 References

📤 Share & Export