Affected versions of sequelize
are vulnerable to SQL Injection. The function sequelize.json()
incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example:
return User.findAll({
where: this.sequelize.json("data.id')) AS DECIMAL) = 1 DELETE YOLO INJECTIONS; -- ", 1)
});
If you are using sequelize
5.x, upgrade to version 5.15.1 or later.
If you are using sequelize
4.x, upgrade to version 4.44.3 or later.
{ "nvd_published_at": null, "github_reviewed_at": "2019-10-22T15:53:58Z", "github_reviewed": true, "severity": "CRITICAL", "cwe_ids": [ "CWE-89" ] }