express-restify-mongoose is a module to easily create a flexible REST interface for mongoose models. express-restify-mongoose 2.4.2 and earlier and 3.0.X through 3.0.1 allows a malicious user to send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This can be used for other private data if the malicious user knew what was set as private for specific routes.
References
Link | Resource |
---|---|
https://github.com/florianholzapfel/express-restify-mongoose/issues/252 | Issue Tracking Third Party Advisory |
https://nodesecurity.io/advisories/92 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-05-31 20:29
Updated : 2024-02-28 16:25
NVD link : CVE-2016-10533
Mitre link : CVE-2016-10533
CVE.ORG link : CVE-2016-10533
JSON object : View
Products Affected
express-restify-mongoose_project
- express-restify-mongoose
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor