CVE-2022-33171 – typeorm
Package
Manager: npm
Name: typeorm
Vulnerable Version: >=0 <0.3.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.05771 pctl0.90133
Details
SQL injection in typeORM The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation.
Metadata
Created: 2022-07-05T00:00:54Z
Modified: 2024-03-21T18:57:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-fx4w-v43j-vc45/GHSA-fx4w-v43j-vc45.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-fx4w-v43j-vc45
Finding: F106
Auto approve: 1