Loading HuntDB...

CVE-2016-10551

UNKNOWN
Published 2018-05-29T20:00:00Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2016-10551. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

waterline-sequel is a module that helps generate SQL statements for Waterline apps Any user input that goes into Waterline's `like`, `contains`, `startsWith`, or `endsWith` will end up in waterline-sequel with the potential for malicious code. A malicious user can input their own SQL statements in waterline-sequel 0.50 that will get executed and have full access to the database.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

SQL Injection in waterline-sequel

GHSA-cgpp-wm2h-6hqx

Advisory Details

Affected versions of `waterline-sequel` are vulnerable to SQL injection in cases where user input is passed into the `like`, `contains`, `startsWith`, or `endsWith` methods. ## Recommendation Upgrade to at least version 0.5.1

Affected Packages

npm waterline-sequel
ECOSYSTEM: ≥0 <0.5.1

CVSS Scoring

CVSS Score

7.5

Advisory provided by GitHub Security Advisory Database. Published: February 18, 2019, Modified: August 31, 2020

References

Published: 2018-05-29T20:00:00Z
Last Modified: 2024-09-16T16:58:50.345Z
Copied to clipboard!