A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.
References
Link | Resource |
---|---|
https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability | Exploit Third Party Advisory |
https://nodesecurity.io/advisories/521 | Exploit Third Party Advisory |
https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability | Exploit Third Party Advisory |
https://nodesecurity.io/advisories/521 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability - Exploit, Third Party Advisory | |
References | () https://nodesecurity.io/advisories/521 - Exploit, Third Party Advisory |
Information
Published : 2018-06-07 02:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-16082
Mitre link : CVE-2017-16082
CVE.ORG link : CVE-2017-16082
JSON object : View
Products Affected
node-postgres
- pg
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')