Privilege Escalation Affecting flintcms package, versions <1.1.10


0.0
critical

Snyk CVSS

    Attack Complexity High
    Scope Changed
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    Exploit Maturity Mature
    EPSS 0.41% (74th percentile)
Expand this section
NVD
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID npm:flintcms:20180817
  • published 19 Aug 2018
  • disclosed 17 Aug 2018
  • credit becojo

How to fix?

Upgrade flintcms to version 1.1.10 or higher.

Overview

flintcms is a CMS built to be easy to use and super flexible.

Affected versions of this package are vulnerable to Privilege Escalation due to lack of user input sanitization in the route that verifies the password reset token. The value from the parameter is directly sent to the Mongoose API which allows a user to insert MongoDB query operators. These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection.

References