Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
SQL Injection via escapeName() in all Drizzle ORM SQL dialects
Vulnerability Description
Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escaped before the identifier was wrapped in quotes or backticks. As a result, applications that pass attacker-controlled input to APIs that construct SQL identifiers or aliases, such as sql.identifier(), .as(), may allow an attacker to terminate the quoted identifier and inject SQL. This vulnerability is fixed in 0.45.2 and 1.0.0-beta.20.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Vulnerability Title
drizzle-orm SQL注入漏洞
Vulnerability Description
drizzle-orm是Drizzle Team开源的一个轻量级、多数据库支持的TypeScript ORM。 drizzle-orm 0.45.2之前版本和1.0.0-beta.20之前版本存在SQL注入漏洞,该漏洞源于escapeName()实现中未正确转义引用的SQL标识符,可能导致SQL注入。
CVSS Information
N/A
Vulnerability Type
N/A