Common Weakness Enumeration (CWE) is a category system for software weaknesses
How to fix?
Upgrade pouchdb to version 1.1.0 or higher.
Overview
pouchdb is PouchDB is a pocket-sized database.
Affected versions of the package are vulnerable to SQL Injection due to not properly escaping the startkey/endkey in the allDocs() function.
You can read more about SQL Injection on our blog.
The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).
Network
Attack Complexity (AC)
Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component.
Low
Privileges Required (PR)
The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
None
User Interaction (UI)
The vulnerable system can be exploited without interaction from any user.
None
Scope (S)
An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority.
Unchanged
Confidentiality (C)
There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the impacted component.
Low
Integrity (I)
Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact on the impacted component.
Low
Availability (A)
There is no impact to availability within the impacted component.