Lucene search

K
githubGitHub Advisory DatabaseGHSA-QPV8-4PJQ-QQH7
HistoryOct 26, 2022 - 12:00 p.m.

feathers-sequelize contains improper input validation leading to SQL injection

2022-10-2612:00:28
CWE-89
GitHub Advisory Database
github.com
8
feathers js
sql injection
software
database security

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.3%

Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used.

Affected configurations

Vulners
Node
featherssequelizeRange<6.3.4
CPENameOperatorVersion
feathers-sequelizelt6.3.4

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.3%

Related for GHSA-QPV8-4PJQ-QQH7