Description
waterline-sequel is a module that helps generate SQL statements for Waterline apps Any user input that goes into Waterline's `like`, `contains`, `startsWith`, or `endsWith` will end up in waterline-sequel with the potential for malicious code. A malicious user can input their own SQL statements in waterline-sequel 0.50 that will get executed and have full access to the database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0274 | waterline-sequel is a module that helps generate SQL statements for Waterline apps Any user input that goes into Waterline's `like`, `contains`, `startsWith`, or `endsWith` will end up in waterline-sequel with the potential for malicious code. A malicious user can input their own SQL statements in waterline-sequel 0.50 that will get executed and have full access to the database. |
Github GHSA |
GHSA-cgpp-wm2h-6hqx | SQL Injection in waterline-sequel |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-16T16:58:50.345Z
Reserved: 2017-10-29T00:00:00.000Z
Link: CVE-2016-10551
No data.
Status : Modified
Published: 2018-05-29T20:29:00.690
Modified: 2024-11-21T02:44:14.877
Link: CVE-2016-10551
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA