Miggo Logo

GHSA-f5cv-xrv9-r8w7: NoSQL injection in express-cart

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
9/1/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
express-cartnpm<= 1.1.71.1.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability report explicitly states both customer and admin login handlers pass JSON parameters directly to MongoDB. In Express applications, these would typically be route handler functions processing POST requests. The lack of input sanitization before constructing database queries with user-controlled values (email/password) makes these handlers vulnerable to operator injection. The $regex exploitation pattern confirms direct query object manipulation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* `*xpr*ss-**rt` ***or* *.*.* *r* vuln*r**l* to NoSQL inj**tion. T** vuln*r**ility is **us** *y t** l**k o* us*r input s*nitiz*tion in t** lo*in **n*l*rs. In *ot* **s*s, t** *ustom*r lo*in *n* t** **min lo*in, p*r*m*t*rs *rom t** JSON *o*

Reasoning

T** vuln*r**ility r*port *xpli*itly st*t*s *ot* *ustom*r *n* **min lo*in **n*l*rs p*ss JSON p*r*m*t*rs *ir**tly to Mon*o**. In `*xpr*ss` *ppli**tions, t**s* woul* typi**lly ** rout* **n*l*r `*un*tions` pro**ssin* `POST` r*qu*sts. T** l**k o* input s*