Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
References
Link | Resource |
---|---|
https://github.com/sequelize/sequelize/commit/9bd0bc1%2C | |
https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751%2C |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-10-17 19:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-10752
Mitre link : CVE-2019-10752
CVE.ORG link : CVE-2019-10752
JSON object : View
Products Affected
sequelizejs
- sequelize
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')