2024-12-08 03:06:42 +00:00

148 lines
4.8 KiB
JSON

{
"id": "CVE-2016-10533",
"sourceIdentifier": "support@hackerone.com",
"published": "2018-05-31T20:29:01.110",
"lastModified": "2024-11-21T02:44:12.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "express-restify-mongoose is a module to easily create a flexible REST interface for mongoose models. express-restify-mongoose 2.4.2 and earlier and 3.0.X through 3.0.1 allows a malicious user to send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This can be used for other private data if the malicious user knew what was set as private for specific routes."
},
{
"lang": "es",
"value": "express-restify-mongoose es un modulo para crear f\u00e1cilmente una interfaz REST flexible para modelos mongoose. express-restify-mongoose en versiones 2.4.2 y anteriores y versiones 3.0.X hasta la 3.0.1 permite que un usuario malicioso env\u00ede una petici\u00f3n para \"GET /User?distinct=password\" y obtenga todas las contrase\u00f1as de todos los usuarios de la base de datos, aunque el campo est\u00e9 marcado como privado. Esto puede emplearse para otro tipo de datos privados si el usuario malicioso sabe qu\u00e9 se marca como privado en rutas espec\u00edficas."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:express-restify-mongoose_project:express-restify-mongoose:*:*:*:*:*:node.js:*:*",
"versionEndIncluding": "2.4.2",
"matchCriteriaId": "180B3984-F012-4A58-9A33-DF93C5E0F805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:express-restify-mongoose_project:express-restify-mongoose:*:*:*:*:*:node.js:*:*",
"versionStartIncluding": "3.0.0",
"versionEndIncluding": "3.0.1",
"matchCriteriaId": "0B2650DA-6D3C-4C9B-ACDA-847653549554"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/florianholzapfel/express-restify-mongoose/issues/252",
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://nodesecurity.io/advisories/92",
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/florianholzapfel/express-restify-mongoose/issues/252",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://nodesecurity.io/advisories/92",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}