SQL Injection Affecting @frangoteam/fuxa package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.11% (45th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-FRANGOTEAMFUXA-5915288
- published 22 Sep 2023
- disclosed 22 Sep 2023
- credit Mateus Tesser
Introduced: 22 Sep 2023
CVE-2023-31717 Open this link in a new tabHow to fix?
There is no fixed version for @frangoteam/fuxa
.
Overview
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software
Affected versions of this package are vulnerable to SQL Injection via the HTTP POST id
parameter passed in the body as JSON, due to improper user-input sanitization. An attacker can extract confidential information from the SQLite database by exploiting this vulnerability.
PoC
"id":"n_7c734712-aabf4eb3' AND 2630=LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2)))) AND 'MIZH'='MIZH"
References
CVSS Scores
version 3.1