loopback@3.11.0 vulnerabilities

LoopBack: Open Source Framework for Node.js

Direct Vulnerabilities

Known vulnerabilities in the loopback package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
SQL Injection

loopback is a highly-extensible, open-source Node.js framework that enables you to create dynamic end-to-end REST APIs, access data from several databases, incorporate model relationships and access controls for complex APIs, and more.

Affected versions of this package are vulnerable to SQL Injection. It is possible to send queries using the username and email fields in the /Users/login path, allowing sensitive user information to be compromised.

e.g.

{
    "email": {"regexp": "^a" },
    "password": "anything you want"
}

How to fix SQL Injection?

Upgrade loopback to version 3.26.0, 2.42.0 or higher.

>=3.0.0 <3.26.0 <2.42.0
  • H
Improper Authorization

loopback is a highly-extensible, open-source Node.js framework that enables you to create dynamic end-to-end REST APIs, access data from several databases, incorporate model relationships and access controls for complex APIs, and more.

Affected versions of this package are vulnerable to Improper Authorization. An attacker can create Authentication Tokens on behalf of other users. If the AccessToken model is publicly exposed, the attacker can create tokens for any user as long as they know the target's userId. This will allow the attacker to access the user's data and their privileges.

How to fix Improper Authorization?

Upgrade loopback to version 2.40.0, 3.22.0 or higher.

>=2.0.0 <2.40.0 >=3.0.0 <3.22.0
  • M
Authentication Bypass

loopback is an Open Source Framework for Node.js.

Affected versions of the package are vulnerable to Authentication Bypass. It allowes users to change Admin's password by using their regular access token in case they have the same id and the same password.

How to fix Authentication Bypass?

Upgrade loopback to version 3.16.2 or higher.

<3.16.2