Description
A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.
Remediation
References
https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-jqv5-7xpx-qj74
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1645
Related Vulnerabilities
CVE-2020-25633 Vulnerability in maven package org.jboss.resteasy:resteasy-client-api
CVE-2013-6447 Vulnerability in maven package org.jboss.seam:jboss-seam-remoting
CVE-2022-36913 Vulnerability in maven package org.jenkins-ci.plugins:openstack-heat
CVE-2015-0226 Vulnerability in maven package org.apache.wss4j:wss4j-ws-security-dom
CVE-2021-31403 Vulnerability in maven package com.vaadin:vaadin-server