Description
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier.
Remediation
References
https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03
https://nodesecurity.io/advisories/112
Related Vulnerabilities
CVE-2023-29509 Vulnerability in maven package org.xwiki.platform:xwiki-platform-flamingo-theme-ui
CVE-2022-36915 Vulnerability in maven package org.jenkins-ci.plugins:android-signing
CVE-2023-49798 Vulnerability in npm package @openzeppelin/contracts
CVE-2019-10806 Vulnerability in maven package org.webjars.npm:vega-util
CVE-2023-46497 Vulnerability in npm package @evershop/evershop