| عنوان | Jawher Kl node-api-postgres 2.5 SQL Injection |
|---|
| الوصف | A Critical SQL Injection vulnerability exists in the node-api-postgres application. In the file models/user.js (within User.getAll()), the sort parameter provided via the GET /users endpoint is concatenated directly into the SQL query without adequate sanitization or parameterized execution. Because ORDER BY clauses cannot be parameterized in PostgreSQL, this direct string concatenation allows unauthenticated attackers (after obtaining a basic user JWT) to execute arbitrary SQL commands. This can be exploited to achieve boolean-based data extraction or full data exfiltration via subqueries (e.g., extracting admin bcrypt password hashes and emails). |
|---|
| المصدر | ⚠️ https://hackmd.io/@YzU_KiOzT86cEbFQdBceVg/Bk56LQQYbe |
|---|
| المستخدم | yeee3642 (UID 91336) |
|---|
| ارسال | 02/03/2026 04:14 PM (2 أشهر منذ) |
|---|
| الاعتدال | 14/03/2026 11:40 PM (12 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 351097 [JawherKl node-api-postgres حتى 2.5 models/user.js User.getAll sort حقن SQL] |
|---|
| النقاط | 20 |
|---|