Lucene search

K
githubGitHub Advisory DatabaseGHSA-JQV5-7XPX-QJ74
HistoryMar 13, 2023 - 8:00 p.m.

sqlite vulnerable to code execution due to Object coercion

2023-03-1320:00:52
CWE-913
CWE-915
GitHub Advisory Database
github.com
47
sqlite
vulnerability
tostring
code execution
denial-of-service
sqlite3
patch
upgrade
sanitization
javascript
object coercion

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.1%

Impact

Due to the underlying implementation of .ToString(), it’s possible to execute arbitrary JavaScript, or to achieve a denial-of-service, if a binding parameter is a crafted Object.

Users of sqlite3 v5.0.0 - v5.1.4 are affected by this.

Patches

Fixed in v5.1.5. All users are recommended to upgrade to v5.1.5 or later.

Workarounds

  • Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters.

References

For more information

If you have any questions or comments about this advisory:

Credits: Dave McDaniel of Cisco Talos

Affected configurations

Vulners
Node
sqlite3Range5.0.05.1.5
VendorProductVersionCPE
*sqlite3*cpe:2.3:a:*:sqlite3:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.1%