GHSA-f5cv-xrv9-r8w7 – express-cart
Package
Manager: npm
Name: express-cart
Vulnerable Version: >=0 <1.1.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
NoSQL injection in express-cart Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection. The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators. These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start. ## Recommendation Update to version 1.1.8 or later.
Metadata
Created: 2020-09-01T21:17:16Z
Modified: 2021-09-24T20:58:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-f5cv-xrv9-r8w7/GHSA-f5cv-xrv9-r8w7.json
CWE IDs: ["CWE-89"]
Alternative ID: N/A
Finding: F106
Auto approve: 1