漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
SQL Injection via escapeName() in all Drizzle ORM SQL dialects
Vulnerability Description
Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escaped before the identifier was wrapped in quotes or backticks. As a result, applications that pass attacker-controlled input to APIs that construct SQL identifiers or aliases, such as sql.identifier(), .as(), may allow an attacker to terminate the quoted identifier and inject SQL. This vulnerability is fixed in 0.45.2 and 1.0.0-beta.20.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Vulnerability Title
drizzle-orm SQL注入漏洞
Vulnerability Description
drizzle-orm是Drizzle Team开源的一个轻量级、多数据库支持的TypeScript ORM。 drizzle-orm 0.45.2之前版本和1.0.0-beta.20之前版本存在SQL注入漏洞,该漏洞源于escapeName()实现中未正确转义引用的SQL标识符,可能导致SQL注入。
CVSS Information
N/A
Vulnerability Type
N/A