Property
Languagejavascript
Severitymedium
CWECWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes
OWASPA08:2021 - Software and Data Integrity Failures
Confidence LevelLow
Impact LevelMedium
Likelihood LevelMedium

Description#

The code builds SQL queries by directly concatenating variables into the query string when using node-postgres. If any of these variables contain user input and are not properly sanitized, this can allow attackers to inject malicious SQL commands.

Impact#

An attacker could manipulate the SQL query to access, modify, or delete database data without authorization. This could lead to data breaches, corruption, or loss, and potentially compromise the entire application’s security.