Описание
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the replacements and the where option in the same query.
Ссылки
- Patch
- ExploitIssue Tracking
- Release Notes
- ExploitVendor Advisory
- Patch
- ExploitIssue Tracking
- Release Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.19.1 (исключая)
cpe:2.3:a:sequelizejs:sequelize:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 88%
0.03983
Низкий
10 Critical
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-89
CWE-89
Связанные уязвимости
CVSS3: 10
github
почти 3 года назад
Sequelize vulnerable to SQL Injection via replacements
EPSS
Процентиль: 88%
0.03983
Низкий
10 Critical
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-89
CWE-89