logo

CVE-2017-20160 express-param

Package

Manager: npm
Name: express-param
Vulnerable Version: >=0 <1.0.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00072 pctl0.22636

Details

express-param vulnerable to Improper Handling of Extra Parameters A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file `lib/fetchParams.js`. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 can address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability.

Metadata

Created: 2022-12-31T21:30:20Z
Modified: 2023-01-09T21:59:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-fr54-72wr-cqvq/GHSA-fr54-72wr-cqvq.json
CWE IDs: ["CWE-235"]
Alternative ID: GHSA-fr54-72wr-cqvq
Finding: F067
Auto approve: 1