Bug 2389970 (CVE-2019-10790)

Summary: CVE-2019-10790 taffy: taffydb: Internal Property Tampering
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: amctagga, aoconnor, bniver, flucifre, gmeno, mbenjamin, mhackett, sostapov, vereddy
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
taffydb npm module, vulnerable in all versions up to and including 2.7.3, allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2389971, 2389973, 2393372, 2389972, 2389974, 2393370    
Bug Blocks:    

Description OSIDB Bzimport 2025-08-20 22:41:48 UTC
taffydb npm module, vulnerable in all versions up to and including 2.7.3, allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.

Comment 1 Sage McTaggart 2025-09-08 19:20:27 UTC
sagemct:ceph7srcgit$ grep -ir taffydb
thrift/thrift/thrift-0.15.0/package-lock.json:        "taffydb": "2.6.2",
thrift/thrift/thrift-0.15.0/package-lock.json:    "taffydb": {
thrift/thrift/thrift-0.15.0/package-lock.json:      "resolved": "https://registry.npmjs.org/taffydb/-/taffydb-2.6.2.tgz",
thrift/thrift/thrift-0.15.0/lib/js/package-lock.json:        "taffydb": "2.6.2",
thrift/thrift/thrift-0.15.0/lib/js/package-lock.json:    "taffydb": {
thrift/thrift/thrift-0.15.0/lib/js/package-lock.json:      "resolved": "https://registry.npmjs.org/taffydb/-/taffydb-2.6.2.tgz",
thrift/thrift/thrift-0.15.0/lib/ts/package-lock.json:        "taffydb": "2.6.2",
thrift/thrift/thrift-0.15.0/lib/ts/package-lock.json:    "taffydb": {
thrift/thrift/thrift-0.15.0/lib/ts/package-lock.json:      "resolved": "https://registry.npmjs.org/taffydb/-/taffydb-2.6.2.tgz",