SQL Injection Affecting express-cart package, versions <1.1.8


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-EXPRESSCART-72404
  • published 26 Sep 2018
  • disclosed 11 Sep 2018
  • credit becojo

Introduced: 11 Sep 2018

CVE NOT AVAILABLE CWE-89 Open this link in a new tab

How to fix?

Upgrade express-cart to version 1.1.8 or higher.

Overview

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to SQL Injection due to a lack of user input sanitization in the login handlers. An attacker could enumerate the email address of the customers and the administrators.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.3 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    Low