Improper Control of Dynamically-Managed Code Resources Affecting node-sqlite3 package, versions <5.0.0+ds1-1+deb11u2
Threat Intelligence
EPSS
0.28% (69th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-NODESQLITE3-3358960
- published 14 Mar 2023
- disclosed 16 Mar 2023
Introduced: 14 Mar 2023
CVE-2022-43441 Open this link in a new tabHow to fix?
Upgrade Debian:11 node-sqlite3 to version 5.0.0+ds1-1+deb11u2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream node-sqlite3 package and not the node-sqlite3 package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.
CVSS Scores
version 3.1