<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Marten (&lt;= 8.36) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/marten--8.36/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:47:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/marten--8.36/feed.xml" rel="self" type="application/rss+xml"/><item><title>Marten Full-Text Search SQL Injection Vulnerability (CVE-2026-45288)</title><link>https://feed.craftedsignal.io/briefs/2026-05-marten-sql-injection/</link><pubDate>Thu, 14 May 2026 20:47:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-marten-sql-injection/</guid><description>Marten versions up to 8.36 are vulnerable to SQL injection due to the `regConfig` parameter in full-text search APIs not being properly validated or parameterized, allowing attackers to inject arbitrary SQL commands by manipulating the `regConfig` parameter, potentially leading to information disclosure, data manipulation, or denial-of-service; version 8.36.1 addresses this vulnerability.</description><content:encoded><![CDATA[<p>Marten, a .NET transactional document database and event store, contains a SQL injection vulnerability (CVE-2026-45288) in versions 8.36 and earlier. The vulnerability stems from the improper handling of the <code>regConfig</code> parameter within its full-text search APIs. Specifically, the <code>regConfig</code> parameter, intended to specify the text search configuration, is directly interpolated into SQL queries without sufficient validation or parameterization. This allows an attacker to inject arbitrary SQL commands by crafting a malicious <code>regConfig</code> value. Successful exploitation can lead to unauthorized data access, modification, or denial-of-service. The vulnerability was privately reported and patched in version 8.36.1 by introducing regular expression validation of the <code>regConfig</code> parameter.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an application using a vulnerable version of Marten (&lt;= 8.36) with exposed <code>regConfig</code> parameter.</li>
<li>The attacker crafts a malicious <code>regConfig</code> value containing SQL injection payloads (e.g., <code>english'; SELECT version(); --</code>).</li>
<li>The attacker injects the malicious <code>regConfig</code> value into one of the vulnerable API endpoints like <code>IQuerySession.SearchAsync&lt;T&gt;(string searchTerm, string regConfig, ...)</code> via a request parameter (e.g. <code>?lang=</code>).</li>
<li>The Marten application receives the request and incorporates the malicious <code>regConfig</code> value into the generated SQL query.</li>
<li>The database executes the attacker-injected SQL commands. This could involve selecting data, dropping tables, or causing delays using <code>pg_sleep</code>.</li>
<li>The attacker observes the effects of the injected SQL, such as information disclosure through error messages or timing differences, or direct extraction if query results are surfaced.</li>
<li>The attacker escalates the attack based on the initial success, potentially gaining full control over the database contents or disrupting service availability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-45288) can have severe consequences. An attacker could gain unauthorized access to sensitive data, leading to confidentiality breaches. Data integrity is also at risk, as attackers can modify or delete data. Furthermore, attackers can cause denial-of-service by injecting commands that consume excessive resources or disrupt database operations. The specific impact depends on the privileges of the database user used by the Marten application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Marten to version 8.36.1 or later to remediate the vulnerability. The patch introduces validation on the <code>regConfig</code> parameter (<a href="https://github.com/JasperFx/marten/pull/4343">JasperFx/marten#4343</a>).</li>
<li>If upgrading is not immediately feasible, implement one of the suggested workarounds, such as hardcoding <code>regConfig</code> or validating user-supplied input against a safe regex.</li>
<li>Monitor web server logs for requests containing potentially malicious SQL injection attempts in the <code>regConfig</code> parameter. Deploy the Sigma rule to detect SQL injection attempts in HTTP requests targeting Marten applications.</li>
<li>Implement input validation on the application layer to sanitize user input before passing it to Marten, specifically for the <code>regConfig</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>cve</category><category>ghsa</category><category>web-application</category></item></channel></rss>