Miggo Logo

CVE-2024-10491: Express ressource injection

4

CVSS Score
3.1

Basic Information

EPSS Score
0.09089%
Published
10/29/2024
Updated
12/19/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
expressnpm<= 3.21.44.0.0-rc1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability documentation explicitly identifies the Express.response.links function as the source of improper sanitization. The function's role in building Link headers using dynamic parameters makes it susceptible to injection when special characters are not neutralized. The reproduction examples demonstrate exploitation via this function, and the CWE-74 classification confirms an injection pattern. The file path is inferred from Express's internal structure where response methods are typically defined.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility **s ***n i**nti*i** in t** *xpr*ss r*spons*.links *un*tion, *llowin* *or *r*itr*ry r*sour** inj**tion in t** Link *****r w**n uns*nitiz** **t* is us**. T** issu* *ris*s *rom improp*r s*nitiz*tion in `Link` *****r v*lu*s, w*i** **n *l

Reasoning

T** vuln*r**ility *o*um*nt*tion *xpli*itly i**nti*i*s t** `*xpr*ss.r*spons*.links` *un*tion *s t** sour** o* improp*r s*nitiz*tion. T** *un*tion's rol* in *uil*in* Link *****rs usin* *yn*mi* p*r*m*t*rs m*k*s it sus**pti*l* to inj**tion w**n sp**i*l *