Arbitrary Code Execution Affecting express-cart package, versions <1.1.7


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.24% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDnpm:express-cart:20180606
  • published6 Jun 2018
  • disclosed6 Jun 2018
  • creditPatrick (patrickrbc)

Introduced: 6 Jun 2018

CVE-2018-3758  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade express-cart to version 1.1.7 or higher.

Overview

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows a privileged users to upload files to the server, and choose which path it'll be saved in. The path does not do through validation, nor is the file type or size validated. This may allow an attacker to upload malicious files that may execute code on the server, send data back to the attacker or cause a denial of service.

CVSS Base Scores

version 3.1