Privilege Escalation Affecting express-cart package, versions <1.1.6


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID npm:express-cart:20180712
  • published 21 Aug 2018
  • disclosed 12 Jul 2018
  • credit patrickrbc

How to fix?

Upgrade express-cart to version 1.1.6 or higher.

Overview

express-cart is a fully functioning Node.js shopping cart with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Privilege Escalation. Users from expressCart could add new users as administrators to the application due to deficiency in the access control.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
9.8 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High