CVE-2016-10550

sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sequelizejs:sequelize:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 02:44

Type Values Removed Values Added
References () https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03 - Patch, Third Party Advisory () https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03 - Patch, Third Party Advisory
References () https://nodesecurity.io/advisories/112 - Patch, Third Party Advisory () https://nodesecurity.io/advisories/112 - Patch, Third Party Advisory

Information

Published : 2018-05-31 20:29

Updated : 2024-11-21 02:44


NVD link : CVE-2016-10550

Mitre link : CVE-2016-10550

CVE.ORG link : CVE-2016-10550


JSON object : View

Products Affected

sequelizejs

  • sequelize
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')