Miggo Logo

CVE-2023-50718: NocoDB SQL Injection vulnerability

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.20536%
Published
5/13/2024
Updated
5/14/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
nocodbnpm<= 0.202.90.202.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is explicitly traced to the columnList method in VitessClient.ts where user-supplied table_name (args.tn) is concatenated into a raw SQL query. The code pattern '${args.tn}' demonstrates unsafe string interpolation rather than using prepared statements. This matches classic SQL injection patterns and is explicitly called out in all vulnerability descriptions as the root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry --- *n *ut**nti**t** *tt**k*r wit* *r**t* ****ss *oul* *on*u*t * SQL Inj**tion *tt**k on MySQL ** usin* un*s**p** t**l*_n*m*. ### **t*ils --- ### SQL Inj**tion vuln*r**ility o**urs in **Vit*ss*li*nt.ts**. ```j*v*s*ript *syn* *olumnList(*

Reasoning

T** vuln*r**ility is *xpli*itly tr**** to t** *olumnList m*t*o* in Vit*ss*li*nt.ts w**r* us*r-suppli** t**l*_n*m* (*r*s.tn) is *on**t*n*t** into * r*w SQL qu*ry. T** *o** p*tt*rn `'${*r*s.tn}'` **monstr*t*s uns*** strin* int*rpol*tion r*t**r t**n usi