Description
A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.
Remediation
References
https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-jqv5-7xpx-qj74
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1645
Related Vulnerabilities
CVE-2020-1938 Vulnerability in maven package org.apache.tomcat:tomcat-util
CVE-2023-30537 Vulnerability in maven package org.xwiki.platform:xwiki-platform-flamingo-theme-ui
CVE-2022-35915 Vulnerability in npm package @openzeppelin/contracts
CVE-2021-41184 Vulnerability in maven package org.webjars.bowergithub.jquery:jquery-ui
CVE-2023-49653 Vulnerability in maven package org.jenkins-ci.plugins:jira