Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jqv5-7xpx-qj74

Опубликовано: 13 мар. 2023
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

sqlite vulnerable to code execution due to Object coercion

Impact

Due to the underlying implementation of .ToString(), it's possible to execute arbitrary JavaScript, or to achieve a denial-of-service, if a binding parameter is a crafted Object.

Users of sqlite3 v5.0.0 - v5.1.4 are affected by this.

Patches

Fixed in v5.1.5. All users are recommended to upgrade to v5.1.5 or later.

Workarounds

  • Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters.

References

For more information

If you have any questions or comments about this advisory:

Credits: Dave McDaniel of Cisco Talos

Пакеты

Наименование

sqlite3

npm
Затронутые версииВерсия исправления

>= 5.0.0, < 5.1.5

5.1.5

EPSS

Процентиль: 91%
0.06448
Низкий

8.1 High

CVSS3

Дефекты

CWE-913
CWE-915

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 3 года назад

A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.

CVSS3: 8.1
nvd
почти 3 года назад

A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.

CVSS3: 8.1
debian
почти 3 года назад

A code execution vulnerability exists in the Statement Bindings functi ...

EPSS

Процентиль: 91%
0.06448
Низкий

8.1 High

CVSS3

Дефекты

CWE-913
CWE-915