{ "schema_version": "1.4.0", "id": "GHSA-crhg-xgrg-vvcc", "modified": "2023-01-13T21:34:29Z", "published": "2023-01-13T21:34:29Z", "aliases": [], "summary": "a12nserver vulnerable to potential SQL Injections via Knex dependency", "details": "### Impact\n\nUsers of a12nserver that use MySQL might be vulnerable to SQL injection bugs. \n\nIf you use a12nserver and MySQL, update as soon as possible. This SQL injection bug might let an attacker obtain OAuth2 Access Tokens for users unrelated to those that permitted OAuth2 clients.\n\n### Patches\n\nThe knex dependency has been updated to 2.4.0 in a12nserver 0.23.0\n\n### Workarounds\n\nNo further workarounds\n\n### References\n\n* https://github.com/knex/knex/issues/1227\n* https://nvd.nist.gov/vuln/detail/CVE-2016-20018\n* https://www.ghostccamm.com/blog/knex_sqli/\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "@curveball/a12n-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.20.0" }, { "fixed": "0.23.0" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/curveball/a12n-server/security/advisories/GHSA-crhg-xgrg-vvcc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-20018" }, { "type": "WEB", "url": "https://github.com/knex/knex/issues/1227" }, { "type": "WEB", "url": "https://github.com/curveball/a12n-server/commit/f4acd7549043e6e2b8917b77a50dce0756a922cc" }, { "type": "PACKAGE", "url": "https://github.com/curveball/a12n-server" }, { "type": "WEB", "url": "https://github.com/curveball/a12n-server/releases/tag/v0.23.0" }, { "type": "WEB", "url": "https://www.ghostccamm.com/blog/knex_sqli" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-01-13T21:34:29Z", "nvd_published_at": "2023-01-13T16:15:00Z" } }