Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2v7q-2xqx-f4q5

Опубликовано: 18 фев. 2019
Источник: github
Github: Прошло ревью

Описание

Potential SQL Injection in sequelize

Affected versions of sequelize are vulnerable to SQL Injection when user input is passed into findOne or into a statement such as where: "user input".

Recommendation

Update to version 3.0.0 or later.

Version 3.0.0 will introduce a number of breaking changes. Thankfully, the project authors have provided a 2.x -> 3.x upgrade guide to ease this transition.

If upgrading is not an option, it is also possible to mitigate this by ensuring that all uses of where: "input" and findOne("input") are properly sanitized, such as by the use of a wrapper function.

Пакеты

Наименование

sequelize

npm
Затронутые версииВерсия исправления

<= 2.1.3

3.0.0

EPSS

Процентиль: 50%
0.00266
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. A fix was pushed out that fixed potential SQL injection in sequelize 2.1.3 and earlier.

EPSS

Процентиль: 50%
0.00266
Низкий

Дефекты

CWE-89