SQL Injection Affecting loopback package, versions >=3.0.0 <3.26.0<2.42.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-LOOPBACK-174846
  • published30 May 2019
  • disclosed13 May 2019
  • creditgabjauf

Introduced: 13 May 2019

CVE NOT AVAILABLE CWE-89  (opens in a new tab)

How to fix?

Upgrade loopback to version 3.26.0, 2.42.0 or higher.

Overview

loopback is a highly-extensible, open-source Node.js framework that enables you to create dynamic end-to-end REST APIs, access data from several databases, incorporate model relationships and access controls for complex APIs, and more.

Affected versions of this package are vulnerable to SQL Injection. It is possible to send queries using the username and email fields in the /Users/login path, allowing sensitive user information to be compromised.

e.g.

{
    "email": {"regexp": "^a" },
    "password": "anything you want"
}

CVSS Scores

version 3.1