Vulnerability Description
waterline-sequel is a module that helps generate SQL statements for Waterline apps Any user input that goes into Waterline's `like`, `contains`, `startsWith`, or `endsWith` will end up in waterline-sequel with the potential for malicious code. A malicious user can input their own SQL statements in waterline-sequel 0.50 that will get executed and have full access to the database.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Balderdash | Waterline-Sequel | 0.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530ExploitIssue TrackingThird Party Advisory
- https://nodesecurity.io/advisories/115Third Party Advisory
- https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530ExploitIssue TrackingThird Party Advisory
- https://nodesecurity.io/advisories/115Third Party Advisory
FAQ
What is CVE-2016-10551?
CVE-2016-10551 is a vulnerability with a CVSS score of 9.8 (CRITICAL). waterline-sequel is a module that helps generate SQL statements for Waterline apps Any user input that goes into Waterline's `like`, `contains`, `startsWith`, or `endsWith` will end up in waterline-se...
How severe is CVE-2016-10551?
CVE-2016-10551 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10551?
Check the references section above for vendor advisories and patch information. Affected products include: Balderdash Waterline-Sequel.