Closed renovate[bot] closed 3 years ago
This is probably one of the two most exploited vulnerabilities in web applications and has led to a number of high profile company breaches. It occurs when an application fails to sanitize or validate input before using it to dynamically construct a statement. An attacker that exploits this vulnerability will be able to gain access to the underlying database and view or modify data without permission.
Examine code which interacts with relational databases and identify how each statement or query is constructed. Check if any statements are built by joining strings with external inputs and trace these data flows to see whether proper filtering or encoding was performed. Determine if special characters (such as single quotes) and keywords (such as SELECT or DROP) supplied in inputs can affect the statement that is constructed.
This is probably one of the two most exploited vulnerabilities in web applications and has led to a number of high profile company breaches. It occurs when an application fails to sanitize or validate input before using it to dynamically construct a statement. An attacker that exploits this vulnerability will be able to gain access to the underlying database and view or modify data without permission.
Examine code which interacts with relational databases and identify how each statement or query is constructed. Check if any statements are built by joining strings with external inputs and trace these data flows to see whether proper filtering or encoding was performed. Determine if special characters (such as single quotes) and keywords (such as SELECT or DROP) supplied in inputs can affect the statement that is constructed.
The Denial of Service (DoS) attack is focused on making a resource (site, application, server) unavailable for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others.
_Credits: Denial of Service_
This PR contains the following updates:
4.6.0
->4.44.4
GitHub Vulnerability Alerts
CVE-2019-10752
Affected versions of
sequelize
are vulnerable to SQL Injection. The functionsequelize.json()
incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example:const Sequelize = require('sequelize');
const sequelize = new Sequelize({ dialect: 'sqlite', storage: 'database.sqlite' });
const TypeError = sequelize.define('TypeError', { name: Sequelize.STRING, });
TypeError.sync({force: true}).then(() => { return TypeError.create({name: "SELECT tbl_name FROM sqlite_master"}); });
v4.31.2
Compare Source
Bug Fixes
v4.31.1
Compare Source
Bug Fixes
v4.31.0
Compare Source
Features
v4.30.2
Compare Source
Bug Fixes
v4.30.1
Compare Source
Bug Fixes
v4.30.0
Compare Source
Features
v4.29.3
Compare Source
Bug Fixes
v4.29.2
Compare Source
Bug Fixes
v4.29.1
Compare Source
Bug Fixes
v4.29.0
Compare Source
Features
v4.28.8
Compare Source
Bug Fixes
v4.28.7
Compare Source
Bug Fixes
v4.28.6
Compare Source
Bug Fixes
v4.28.5
Compare Source
Bug Fixes
v4.28.4
Compare Source
Bug Fixes
v4.28.3
Compare Source
Bug Fixes
v4.28.2
Compare Source
Bug Fixes
v4.28.1
Compare Source
Bug Fixes
v4.28.0
Compare Source
Features
v4.27.0
Compare Source
Features
_scopeName
property in instance (#8753) (438baac)v4.26.0
Compare Source
Features
v4.25.2
Compare Source
Bug Fixes
v4.25.1
Compare Source
Bug Fixes
v4.25.0
Compare Source
Features
v4.24.0
Compare Source
Features
v4.23.4
Compare Source
Bug Fixes
v4.23.3
Compare Source
Bug Fixes
v4.23.2
Compare Source
Bug Fixes
v4.23.1
Compare Source
v4.23.0
Compare Source
v4.22.16
Compare Source
v4.22.15
Compare Source
v4.22.14
Compare Source
v4.22.13
Compare Source
v4.22.12
Compare Source
Bug Fixes
v4.22.11
Compare Source
v4.22.10
Compare Source
v4.22.9
Compare Source
Bug Fixes
v4.22.8
Compare Source
v4.22.7
Compare Source
Bug Fixes
v4.22.6
Compare Source
v4.22.5
Compare Source
Bug Fixes
v4.22.4
Compare Source
v4.22.3
Compare Source
v4.22.2
Compare Source
v4.22.1
Compare Source
v4.22.0
Compare Source
Features
v4.21.0
Compare Source
Features
v4.20.3
Compare Source
v4.20.2
Compare Source
v4.20.1
Compare Source
v4.20.0
Compare Source
Features
v4.19.0
Compare Source
Features
v4.18.0
Compare Source
Features
v4.17.2
Compare Source
v4.17.1
Compare Source
v4.17.0
Compare Source
Features
v4.16.2
Compare Source
Bug Fixes
v4.16.1
Compare Source
Bug Fixes
v4.16.0
Compare Source
Features
v4.15.2
Compare Source
Bug Fixes
v4.15.1
Compare Source
v4.15.0
Compare Source
Features
v4.14.0
Compare Source
Features
v4.13.17
Compare Source
Bug Fixes
v4.13.16
Compare Source
Bug Fixes
v4.13.15
Compare Source
Bug Fixes
v4.13.14
Compare Source
Bug Fixes
v4.13.13
Compare Source
Bug Fixes
v4.13.12
Compare Source
Bug Fixes
v4.13.11
Compare Source
Bug Fixes
v4.13.10
Compare Source
Bug Fixes
v4.13.9
Compare Source
v4.13.8
Compare Source
Bug Fixes
v4.13.7
Compare Source
Bug Fixes
v4.13.6
Compare Source
v4.13.5
Compare Source
v4.13.4
Compare Source
Bug Fixes
v4.13.3
Compare Source
v4.13.2
Compare Source
v4.13.1
Compare Source
Bug Fixes
v4.13.0
Compare Source
Features
v4.12.0
Compare Source
Features
v4.11.7
Compare Source
Bug Fixes
v4.11.6
Compare Source
4.11.6 (2017-09-30)
v4.11.5
Compare Source
Bug Fixes
v4.11.4
Compare Source
Bug Fixes
v4.11.3
Compare Source
4.11.3 (2017-09-28)
v4.11.2
Compare Source
Bug Fixes
v4.11.1
Compare Source
Bug Fixes
v4.11.0
Compare Source
Refactor
v4.10.3
Compare Source
Bug Fixes
by
option (#8363) (95901ab)v4.10.2
Compare Source
4.10.2 (2017-09-23)
v4.10.1
Compare Source
Bug Fixes
v4.10.0
Compare Source
Features
v4.9.0
Compare Source
Fixed
v4.8.4
Compare Source
Bug Fixes
v4.8.3
Compare Source
Bug Fixes
Features
v4.8.2
Compare Source
Bug Fixes
v4.8.1
Compare Source
Bug Fixes
->
when subquery still using.
#7742 (#7795) (63978e1)v4.8.0
Compare Source
Bug Fixes
count[Association]
(#8227) (c528f6d)Features
group
s toRenovate configuration
:date: Schedule: "" (UTC).
:vertical_traffic_light: Automerge: Disabled by config. Please merge this manually once you are satisfied.
:recycle: Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
:no_bell: Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.