제출 #770001: Jawher Kl node-api-postgres 2.5 SQL Injection정보

제목Jawher Kl node-api-postgres 2.5 SQL Injection
설명A Critical SQL Injection vulnerability exists in the node-api-postgres application. In the file models/user.js (within User.getAll()), the sort parameter provided via the GET /users endpoint is concatenated directly into the SQL query without adequate sanitization or parameterized execution. Because ORDER BY clauses cannot be parameterized in PostgreSQL, this direct string concatenation allows unauthenticated attackers (after obtaining a basic user JWT) to execute arbitrary SQL commands. This can be exploited to achieve boolean-based data extraction or full data exfiltration via subqueries (e.g., extracting admin bcrypt password hashes and emails).
원천⚠️ https://hackmd.io/@YzU_KiOzT86cEbFQdBceVg/Bk56LQQYbe
사용자
 yeee3642 (UID 91336)
제출2026. 03. 02. PM 04:14 (2 개월 ago)
모더레이션2026. 03. 14. PM 11:40 (12 days later)
상태수락
VulDB 항목351097 [JawherKl node-api-postgres 까지 2.5 models/user.js User.getAll sort SQL 주입]
포인트들20

Might our Artificial Intelligence support you?

Check our Alexa App!