Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-10556

EPSS 0.22% · P44
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-10556

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. This causes potential SQL injection in sequelize 3.19.3 and earlier, where a malicious user could put `["test", "'); DELETE TestTable WHERE Id = 1 --')"]` inside of ``` database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { replacements: { names: directCopyOfUserInput } }); ``` and cause the SQL statement to become `SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --')`. In Postgres, MSSQL, and SQLite, the backslash has no special meaning. This causes the the statement to delete whichever Id has a value of 1 in the TestTable table.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
sequelize SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
sequelize是一个用于Node.js的数据库ORM(对象关系映射)工具。 sequelize 3.19.3及之前版本中存在SQL注入漏洞,该漏洞源于程序将数组用作字符串而却没有正确的对其进行编码。攻击者可利用该漏洞删除TestTable表单中带有1的ID。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
HackerOnesequelize node module <=3.19.3 -

II. Public POCs for CVE-2016-10556

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-10556

登录查看更多情报信息。

Same Patch Batch · HackerOne · 2018-05-29 · 50 CVEs total

CVE-2016-10679selenium-standalone-painful 安全漏洞
CVE-2017-16010i18next 跨站脚本漏洞
CVE-2017-16153gaoxuyan 路径遍历漏洞
CVE-2018-3733crud-file-server node模块路径遍历漏洞
CVE-2018-3734stattic node模块路径遍历漏洞
CVE-2018-3744html-pages node模块路径遍历漏洞
CVE-2018-3745Joyent Node.js atob 安全漏洞
CVE-2017-16062node-tkinter 安全漏洞
CVE-2016-10681roslib-socketio 安全漏洞
CVE-2016-10680adamvr-geoip-lite 安全漏洞
CVE-2016-10682massif 安全漏洞
CVE-2016-10674limbus-buildgen 安全漏洞
CVE-2016-10666tomita-parser 安全漏洞
CVE-2016-10659poco 安全漏洞
CVE-2016-10658native-opencv 安全漏洞
CVE-2016-10650ntfserver 安全漏洞
CVE-2016-10635broccoli-closure 安全漏洞
CVE-2016-10627scala-bin 安全漏洞
CVE-2016-10611strider-sauce 安全漏洞
CVE-2016-10601webdrvr 安全漏洞

Showing top 20 of 50 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2016-10556

No comments yet


Leave a comment