CVE-2017-20160

A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flitto:express-param:*:*:*:*:*:*:*:*

History

29 Feb 2024, 01:20

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en flitto express-param hasta 0.x. Ha sido clasificada como crítica. Esto afecta a una parte desconocida del archivo lib/fetchParams.js. La manipulación conduce a un manejo inadecuado de parámetros adicionales. Es posible iniciar el ataque de forma remota. La actualización a la versión 1.0.0 puede solucionar este problema. El nombre del parche es db94f7391ad0a16dcfcba8b9be1af385b25c42db. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asignó el identificador VDB-217149.

24 Oct 2023, 20:21

Type Values Removed Values Added
CWE NVD-CWE-Other

20 Oct 2023, 12:15

Type Values Removed Values Added
CWE CWE-235
Summary A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability. A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability.

09 Jan 2023, 15:08

Type Values Removed Values Added
First Time Flitto express-param
Flitto
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:flitto:express-param:*:*:*:*:*:*:*:*
References (MISC) https://vuldb.com/?ctiid.217149 - (MISC) https://vuldb.com/?ctiid.217149 - Third Party Advisory
References (MISC) https://github.com/flitto/express-param/releases/tag/1.0.0 - (MISC) https://github.com/flitto/express-param/releases/tag/1.0.0 - Release Notes, Third Party Advisory
References (MISC) https://github.com/flitto/express-param/commit/db94f7391ad0a16dcfcba8b9be1af385b25c42db - (MISC) https://github.com/flitto/express-param/commit/db94f7391ad0a16dcfcba8b9be1af385b25c42db - Patch, Third Party Advisory
References (MISC) https://github.com/flitto/express-param/pull/19 - (MISC) https://github.com/flitto/express-param/pull/19 - Patch, Third Party Advisory
References (MISC) https://vuldb.com/?id.217149 - (MISC) https://vuldb.com/?id.217149 - Third Party Advisory

31 Dec 2022, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-31 20:15

Updated : 2024-04-11 00:58


NVD link : CVE-2017-20160

Mitre link : CVE-2017-20160

CVE.ORG link : CVE-2017-20160


JSON object : View

Products Affected

flitto

  • express-param
CWE
NVD-CWE-Other CWE-235

Improper Handling of Extra Parameters