SQL Injection Affecting loopback package, versions >=3.0.0 <3.26.0 <2.42.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-LOOPBACK-174846
  • published 30 May 2019
  • disclosed 13 May 2019
  • credit gabjauf

Introduced: 13 May 2019

CVE NOT AVAILABLE CWE-89 Open this link in a new tab

How to fix?

Upgrade loopback to version 3.26.0, 2.42.0 or higher.

Overview

loopback is a highly-extensible, open-source Node.js framework that enables you to create dynamic end-to-end REST APIs, access data from several databases, incorporate model relationships and access controls for complex APIs, and more.

Affected versions of this package are vulnerable to SQL Injection. It is possible to send queries using the username and email fields in the /Users/login path, allowing sensitive user information to be compromised.

e.g.

{
    "email": {"regexp": "^a" },
    "password": "anything you want"
}

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None