SQL Injection Affecting @frangoteam/fuxa package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.13% (50th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-FRANGOTEAMFUXA-5914929
- published 22 Sep 2023
- disclosed 22 Sep 2023
- credit Mateus Tesser
Introduced: 22 Sep 2023
CVE-2023-31719 Open this link in a new tabHow to fix?
There is no fixed version for @frangoteam/fuxa
.
Overview
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software
Affected versions of this package are vulnerable to SQL Injection via the /api/signin
endpoint due to improper user-input sanitization. An attacker can manipulate the SQL query to gain unauthorized access or retrieve sensitive data by injecting malicious SQL code.
PoC
{"username":"test' OR 2891=LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2))))-- ZJMj","password":"test"}
References
CVSS Scores
version 3.1