SQL Injection

Affecting sequelize package, versions <3.12.1

Do your applications use this vulnerable package? Test your applications

Overview

sequelize is a multi dialect ORM for Node.JS/io.js. Affected versions of the package are vulnerable to SQL Injection via the user search by typing the name they want to search for and the application then executes:

User.findAll( { where: { name: req.body.name } } )

a malicious attacker may exploit this to find the users password by entering $password$. This could be avoided by specifying the exact column to search: the user column.

Remediation

Upgrade sequelize to version 3.12.1 or higher.

References

CVSS Score

4.3
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    Low
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Credit
overlookmotel
CWE
CWE-89
Snyk ID
npm:sequelize:20151019
Disclosed
18 Oct, 2015
Published
13 Feb, 2017