loopback@3.9.0 vulnerabilities
LoopBack: Open Source Framework for Node.js
-
latest version
3.28.0
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
4 years ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the loopback package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
loopback is a highly-extensible, open-source Node.js framework that enables you to create dynamic end-to-end REST APIs, access data from several databases, incorporate model relationships and access controls for complex APIs, and more. Affected versions of this package are vulnerable to SQL Injection. It is possible to send queries using the username and email fields in the e.g.
How to fix SQL Injection? Upgrade |
>=3.0.0 <3.26.0
<2.42.0
|
loopback is a highly-extensible, open-source Node.js framework that enables you to create dynamic end-to-end REST APIs, access data from several databases, incorporate model relationships and access controls for complex APIs, and more. Affected versions of this package are vulnerable to Improper Authorization. An attacker can create Authentication Tokens on behalf of other users. If the AccessToken model is publicly exposed, the attacker can create tokens for any user as long as they know the target's userId. This will allow the attacker to access the user's data and their privileges. How to fix Improper Authorization? Upgrade |
>=2.0.0 <2.40.0
>=3.0.0 <3.22.0
|
Affected versions of the package are vulnerable to Authentication Bypass. It allowes users to change Admin's password by using their regular access token in case they have the same id and the same password. How to fix Authentication Bypass? Upgrade |
<3.16.2
|