Vulnerability Description
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. Before version 1.7.0-alpha3, sequelize defaulted SQLite to use MySQL backslash escaping, even though SQLite uses Postgres escaping.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sequelizejs | Sequelize | <= 1.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b84786PatchThird Party Advisory
- https://nodesecurity.io/advisories/113PatchThird Party Advisory
- https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b84786PatchThird Party Advisory
- https://nodesecurity.io/advisories/113PatchThird Party Advisory
FAQ
What is CVE-2016-10554?
CVE-2016-10554 is a vulnerability with a CVSS score of 9.8 (CRITICAL). sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS. Before version 1.7.0-alpha3, seq...
How severe is CVE-2016-10554?
CVE-2016-10554 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10554?
Check the references section above for vendor advisories and patch information. Affected products include: Sequelizejs Sequelize.