You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All versions of express-brute are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests.
mend-bolt-for-githubbot
changed the title
WS-2019-0056 (Medium) detected in express-brute-1.0.1.tgz
WS-2019-0056 (High) detected in express-brute-1.0.1.tgz
Oct 13, 2021
mend-bolt-for-githubbot
changed the title
WS-2019-0056 (High) detected in express-brute-1.0.1.tgz
WS-2019-0056 (Critical) detected in express-brute-1.0.1.tgz
Dec 27, 2023
WS-2019-0056 - Critical Severity Vulnerability
Vulnerable Library - express-brute-1.0.1.tgz
A brute-force protection middleware for express routes that rate limits incoming requests
Library home page: https://registry.npmjs.org/express-brute/-/express-brute-1.0.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/express-brute/package.json
Dependency Hierarchy:
Found in HEAD commit: 00bcf25b7a7fe46c985d401d26d6921fd3fadb3d
Found in base branch: master
Vulnerability Details
All versions of express-brute are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests.
Publish Date: 2019-04-23
URL: WS-2019-0056
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/WS-2019-0056
Release Date: 2019-04-23
Fix Resolution: express-brute - 0.7.0-beta.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: