Description
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier.
Remediation
References
https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03
https://nodesecurity.io/advisories/112
Related Vulnerabilities
CVE-2011-2487 Vulnerability in maven package org.apache.cxf:cxf
CVE-2023-47324 Vulnerability in maven package org.silverpeas.core:silverpeas-core-war
CVE-2012-3451 Vulnerability in maven package org.apache.cxf:cxf-rt-bindings-soap
CVE-2023-48796 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-api
CVE-2014-0050 Vulnerability in maven package commons-fileupload:commons-fileupload