typeorm is vulnerable to Improper String Escaping
70
High Risk
Affected versions of this package lack sufficient backlash and single quote escaping in the methods used for drives, migrations, and query runners. It unsafely utilizes String.replace() for escaping, which fails to handle repeated special characters or escape sequences properly. This vulnerability allows attackers to create malicious input with unescaped special characters, potentially breaking the query syntax and enabling SQL injection attacks if the improperly escaped string is handled in a critical context.
You are affected if you are using a version that falls within the vulnerable range.
typeorm is vulnerable to Improper String Escaping in versions 0.3.0 - 0.3.21.
Upgrade the TypeORM library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant