<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-29080 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-29080/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-29080/feed.xml" rel="self" type="application/rss+xml"/><item><title>Rucio SQL Injection Vulnerability in DID Search API</title><link>https://feed.craftedsignal.io/briefs/2026-05-rucio-sql-injection/</link><pubDate>Thu, 07 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rucio-sql-injection/</guid><description>A SQL injection vulnerability exists in the Oracle path of `FilterEngine.create_sqla_query` in Rucio, allowing any authenticated user to execute arbitrary SQL against the backend database via the DID search endpoint, potentially leading to full database compromise and data exfiltration.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability (CVE-2026-29080) has been identified in Rucio&rsquo;s <code>FilterEngine.create_sqla_query</code> function, specifically affecting Oracle database backends. The vulnerability resides in the DID search API (<code>GET /dids/&lt;scope&gt;/dids/search</code>) and allows any authenticated Rucio user to execute arbitrary SQL commands. This is due to attacker-controlled filter keys and values being directly interpolated into <code>sqlalchemy.text</code> via Python&rsquo;s <code>str.format</code>, bypassing proper parameterization. The issue affects Rucio versions &gt;= 1.27.0 and &lt; 35.8.5, versions &gt;= 36.0.0 and &lt; 38.5.5, versions &gt;= 39.0.0 and &lt; 39.4.2, and versions &gt;= 40.0.0 and &lt; 40.1.1 when using the default <code>json_meta</code> metadata plugin configuration with an Oracle database. Successful exploitation can lead to the extraction of sensitive data, including authentication tokens, password hashes, and managed data identifiers, as well as potential data modification or remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Rucio system using any supported authentication method (userpass, x509, OIDC, SAML, SSH, GSS).</li>
<li>The attacker crafts a malicious HTTP GET request to the <code>/dids/&lt;scope&gt;/dids/search</code> endpoint.</li>
<li>The crafted request includes SQL injection payloads within the filter keys or values of the request parameters.</li>
<li>Rucio&rsquo;s <code>FilterEngine.create_sqla_query</code> function processes the request and incorrectly interpolates the attacker-controlled input directly into a SQL query string.</li>
<li>The malicious SQL query is executed against the Oracle backend database.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials, authentication tokens, and data management policies.</li>
<li>The attacker uses stolen authentication tokens to impersonate other users and gain unauthorized access to data.</li>
<li>The attacker modifies data management rules or inserts malicious data into the Rucio system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to gain full read access to the Rucio database, potentially affecting all Oracle-based Rucio deployments using the default <code>json_meta</code> configuration. Attackers can extract sensitive information, including password hashes, authentication tokens, and storage endpoint credentials. The extracted password hashes, combined with weak hashing algorithms (single-iteration SHA-256), can be cracked relatively easily. Stolen authentication tokens enable immediate session hijacking. Furthermore, attackers can modify data or potentially achieve remote code execution via Oracle features like <code>UTL_HTTP</code> or Java stored procedures. This can lead to data breaches, service disruption, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rucio to a patched version &gt;= 35.8.5, &gt;= 38.5.5, &gt;= 39.4.2, or &gt;= 40.1.1 to remediate CVE-2026-29080.</li>
<li>For Oracle deployments, review and harden database user privileges to limit the impact of potential SQL injection attacks.</li>
<li>Monitor Rucio web server logs for suspicious requests to the <code>/dids/&lt;scope&gt;/dids/search</code> endpoint containing potentially malicious SQL syntax. Deploy the Sigma rule <code>Detect Rucio SQL Injection Attempt via DID Search API</code> to detect this behavior.</li>
<li>Implement enhanced password hashing algorithms (e.g., bcrypt, Argon2) to mitigate the impact of password hash extraction.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>rucio</category><category>cve-2026-29080</category><category>web-application</category></item></channel></rss>