8.8
CVE-2016-10533
- EPSS 0.24%
- Veröffentlicht 31.05.2018 20:29:01
- Zuletzt bearbeitet 21.11.2024 02:44:12
- Quelle support@hackerone.com
- CVE-Watchlists
- Unerledigt
express-restify-mongoose is a module to easily create a flexible REST interface for mongoose models. express-restify-mongoose 2.4.2 and earlier and 3.0.X through 3.0.1 allows a malicious user to send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This can be used for other private data if the malicious user knew what was set as private for specific routes.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Express-restify-mongoose Project ≫ Express-restify-mongoose SwPlatformnode.js Version <= 2.4.2
Express-restify-mongoose Project ≫ Express-restify-mongoose SwPlatformnode.js Version >= 3.0.0 <= 3.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.24% | 0.474 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.