You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
CVE-2019-10752 - High Severity Vulnerability
Vulnerable Library - sequelize-5.10.0.tgz
Multi dialect ORM for Node.JS
Library home page: https://registry.npmjs.org/sequelize/-/sequelize-5.10.0.tgz
Path to dependency file: /tmp/ws-scm/mombot/package.json
Path to vulnerable library: /mombot/node_modules/.staging/sequelize-12fb4f5e/package.json
Dependency Hierarchy:
Found in HEAD commit: 2ef985800f531ab0e5415fbed2b8efcd01e4c5ca
Vulnerability Details
Sequelize, all versions prior to version 4.44.3 and 5.15.1, is vulnerable to SQL Injection due to sequelize.json() helper function not escaping values properly when formatting sub paths for JSON queries for MySQL, MariaDB and SQLite.
Publish Date: 2019-10-17
URL: CVE-2019-10752
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10752
Release Date: 2019-09-24
Fix Resolution: 4.44.3,5.15.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: