SQL Injection Affecting connect-pg-simple package, versions <6.0.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-CONNECTPGSIMPLE-460154
  • published27 Aug 2019
  • disclosed21 Aug 2019
  • creditRobert Nilsson

Introduced: 21 Aug 2019

CVE-2019-15658  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade connect-pg-simple to version 6.0.1 or higher.

Overview

connect-pg-simple is a minimal PostgreSQL session store for Express/Connect.

Affected versions of this package are vulnerable to SQL Injection within PGStore.prototype.quotedTable function where user input is wrapped using double quotes. If the schemaName is set to 'web".session WHERE $1=$1;--, it is possible to wipe the web.session table every time the prune process runs.

CVSS Scores

version 3.1