Lucene search

K
githubGitHub Advisory DatabaseGHSA-XQG8-CV3H-XPPV
HistoryOct 24, 2017 - 6:33 p.m.

SQL Injection in sequelize

2017-10-2418:33:36
CWE-89
GitHub Advisory Database
github.com
29

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.002

Percentile

60.4%

Versions 2.0.0-rc-7 and earlier of sequelize are affected by a SQL injection vulnerability when user input is passed into the order parameter.

Proof of Concept

Test.findAndCountAll({
where: { id :1 },
order : [['id', 'UNTRUSTED USER INPUT']]
})

Recommendation

Update to version 2.0.0-rc8 or later

Affected configurations

Vulners
Node
sequelizesequelizeRange2.0.0-rc7
VendorProductVersionCPE
sequelizesequelize*cpe:2.3:a:sequelize:sequelize:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.002

Percentile

60.4%

Related for GHSA-XQG8-CV3H-XPPV