express@4.1.2 vulnerabilities

Fast, unopinionated, minimalist web framework

  • latest version

    4.21.2

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    5 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the express package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting

    express is a minimalist web framework.

    Affected versions of this package are vulnerable to Cross-site Scripting due to improper handling of user input in the response.redirect method. An attacker can execute arbitrary code by passing malicious input to this method.

    Note

    To exploit this vulnerability, the following conditions are required:

    1. The attacker should be able to control the input to response.redirect()

    2. express must not redirect before the template appears

    3. the browser must not complete redirection before:

    4. the user must click on the link in the template

    How to fix Cross-site Scripting?

    Upgrade express to version 4.20.0, 5.0.0 or higher.

    <4.20.0>=5.0.0-alpha.1 <5.0.0
    • M
    Open Redirect

    express is a minimalist web framework.

    Affected versions of this package are vulnerable to Open Redirect due to the implementation of URL encoding using encodeurl before passing it to the location header. This can lead to unexpected evaluations of malformed URLs by common redirect allow list implementations in applications, allowing an attacker to bypass a properly implemented allow list and redirect users to malicious sites.

    How to fix Open Redirect?

    Upgrade express to version 4.19.2, 5.0.0-beta.3 or higher.

    <4.19.2>=5.0.0-alpha.1 <5.0.0-beta.3
    • M
    Cross-site Scripting (XSS)

    express is a minimalist web framework.

    Affected versions of this package do not enforce the user's browser to set a specific charset in the content-type header while displaying 400 level response messages. This could be used by remote attackers to perform a cross-site scripting attack, by using non-standard encodings like UTF-7.

    <3.11.0>=4.0.0 <4.5.0