sqlite vulnerable to code execution due to Object coercion
High severity
GitHub Reviewed
Published
Mar 13, 2023
in
TryGhost/node-sqlite3
•
Updated Mar 22, 2023
Description
Published to the GitHub Advisory Database
Mar 13, 2023
Reviewed
Mar 13, 2023
Published by the National Vulnerability Database
Mar 16, 2023
Last updated
Mar 22, 2023
Impact
Due to the underlying implementation of
.ToString()
, it's possible to execute arbitrary JavaScript, or to achieve a denial-of-service, if a binding parameter is a crafted Object.Users of
sqlite3
v5.0.0 - v5.1.4 are affected by this.Patches
Fixed in v5.1.5. All users are recommended to upgrade to v5.1.5 or later.
Workarounds
References
For more information
If you have any questions or comments about this advisory:
Credits: Dave McDaniel of Cisco Talos
References