SYM_JSTS_0113 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improperly Controlled Modification of Dynamically-Determined Object Attributes

Property Value
Language javascript
Severity medium
CWE CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes
OWASP A08:2021 - Software and Data Integrity Failures
Confidence Level Low
Impact Level Medium
Likelihood Level Medium

Description

The code builds SQL queries by directly concatenating variables into the query string when using node-postgres. If any of these variables contain user input and are not properly sanitized, this can allow attackers to inject malicious SQL commands.

Impact

An attacker could manipulate the SQL query to access, modify, or delete database data without authorization. This could lead to data breaches, corruption, or loss, and potentially compromise the entire application’s security.