Privilege Escalation Affecting flintcms package, versions <1.1.10
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.41% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:flintcms:20180817
- published 19 Aug 2018
- disclosed 17 Aug 2018
- credit becojo
Introduced: 17 Aug 2018
CVE-2018-3783 Open this link in a new tabHow to fix?
Upgrade flintcms
to version 1.1.10 or higher.
Overview
flintcms is a CMS built to be easy to use and super flexible.
Affected versions of this package are vulnerable to Privilege Escalation due to lack of user input sanitization in the route that verifies the password reset token. The value from the parameter is directly sent to the Mongoose API which allows a user to insert MongoDB query operators. These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection.
References
CVSS Scores
version 3.1