Vulnerabilities > CVE-2022-43441 - Improper Control of Dynamically-Managed Code Resources vulnerability in Ghost Sqlite3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-jqv5-7xpx-qj74
- https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-jqv5-7xpx-qj74
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1645