WS-2016-0021 (High) detected in sequelize-3.17.3.tgz
Opened this issue · 0 comments
mend-bolt-for-github commented
WS-2016-0021 - High Severity Vulnerability
Vulnerable Library - sequelize-3.17.3.tgz
Multi dialect ORM for Node.JS/io.js
Library home page: https://registry.npmjs.org/sequelize/-/sequelize-3.17.3.tgz
Path to dependency file: /InfotelAPI2016/package.json
Path to vulnerable library: /InfotelAPI2016/node_modules/sequelize/package.json
Dependency Hierarchy:
- ❌ sequelize-3.17.3.tgz (Vulnerable Library)
Found in HEAD commit: 6d3ae9745a93368ee736c4dc1be87c814e996b3f
Vulnerability Details
There is an IN statement SQL Injection vulnerability in sequelize versions prior to 3.20.0 that improperly escape arrays of strings bound to named parameters.
Publish Date: 2016-04-01
URL: WS-2016-0021
Suggested Fix
Type: Upgrade version
Origin: sequelize/sequelize#5671
Release Date: 2017-01-31
Fix Resolution: 3.20.0
Step up your Open Source Security Game with WhiteSource here