Vulnerability Details : CVE-2016-10533
Potential exploit
express-restify-mongoose is a module to easily create a flexible REST interface for mongoose models. express-restify-mongoose 2.4.2 and earlier and 3.0.X through 3.0.1 allows a malicious user to send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This can be used for other private data if the malicious user knew what was set as private for specific routes.
Vulnerability category: Information leak
Products affected by CVE-2016-10533
- Express-restify-mongoose Project » Express-restify-mongoose » For Node.jsVersions from including (>=) 3.0.0 and up to, including, (<=) 3.0.1cpe:2.3:a:express-restify-mongoose_project:express-restify-mongoose:*:*:*:*:*:node.js:*:*
- Express-restify-mongoose Project » Express-restify-mongoose » For Node.jsVersions up to, including, (<=) 2.4.2cpe:2.3:a:express-restify-mongoose_project:express-restify-mongoose:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-10533
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-10533
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-10533
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2016-10533
-
https://nodesecurity.io/advisories/92
npmExploit;Third Party Advisory
-
https://github.com/florianholzapfel/express-restify-mongoose/issues/252
Leaking private/protected data · Issue #252 · florianholzapfel/express-restify-mongoose · GitHubIssue Tracking;Third Party Advisory
Jump to