NA

CVE-2022-43441

Published: 16/03/2023 Updated: 22/03/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ghost sqlite3

Vendor Advisories

Dave McDaniel discovered that the SQLite3 bindings for Nodejs were susceptible to the execution of arbitrary JavaScript code if a binding parameter is a crafted object For the stable distribution (bullseye), this problem has been fixed in version 500+ds1-1+deb11u2 We recommend that you upgrade your node-sqlite3 packages For the detailed secur ...