← Back to CVEs
CVE-2022-38488
CRITICAL9.8
Description
logrocket-oauth2-example through 2020-05-27 allows SQL injection via the /auth/register username parameter.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/14/2022
Last Modified4/22/2025
Sourcenvd
Honeypot Sightings0
Affected Products
logrocket-oauth2-example_project:logrocket-oauth2-example
Weaknesses (CWE)
CWE-89CWE-89
References
https://archive.ph/PecmD(cve@mitre.org)
https://archive.ph/VlGDa(cve@mitre.org)
https://blog.logrocket.com/implement-oauth-2-0-node-js/(cve@mitre.org)
https://github.com/diogosouza/logrocket-oauth2-example(cve@mitre.org)
https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example(cve@mitre.org)
https://archive.ph/PecmD(af854a3a-2127-422b-91ae-364da2661108)
https://archive.ph/VlGDa(af854a3a-2127-422b-91ae-364da2661108)
https://blog.logrocket.com/implement-oauth-2-0-node-js/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/diogosouza/logrocket-oauth2-example(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.