Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9r25-rp3p-h2w4

Опубликовано: 09 апр. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.6

Описание

crud-query-parser SQL Injection vulnerability

Impact

Improper neutralization of the order/sort parameter in the TypeORM adapter, which allows SQL injection.

You are impacted by this vulnerability if you are using the TypeORM adapter, ordering is enabled and you have not set-up a property filter.

Versions 0.0.1, 0.0.2 and 0.0.3 are affected by this vulnerability.

Patches

This vulnerability has been fixed in version 0.1.0 and newer, which introduces TypeORM field validation (enabled by default).

Workarounds

Add an allowlist of fields

List all valid fields and use the filterProperties function to filter out invalid fields before passing the crudRequest to the TypeOrmQueryAdapter. Here's an example:

crudRequest = filterProperties(crudRequest, ['id', 'title', 'category.name']);

Disable ordering

Cleanup the order field just before passing it to the TypeOrmQueryAdapter. Here's an example:

crudRequest.order = [];

Пакеты

Наименование

crud-query-parser

npm
Затронутые версииВерсия исправления

< 0.1.0

0.1.0

EPSS

Процентиль: 45%
0.00224
Низкий

8.6 High

CVSS4

Дефекты

CWE-89

Связанные уязвимости

nvd
10 месяцев назад

The crud-query-parser library parses query parameters from HTTP requests and converts them to database queries. Improper neutralization of the order/sort parameter in the TypeORM adapter, which allows SQL injection. You are impacted by this vulnerability if you are using the TypeORM adapter, ordering is enabled and you have not set-up a property filter. This vulnerability is fixed in 0.1.0.

EPSS

Процентиль: 45%
0.00224
Низкий

8.6 High

CVSS4

Дефекты

CWE-89