Описание
Improper Authorization in loopback
Vulnerable versions of loopback may allow attackers to create Authentication Tokens on behalf of other users due to Improper Authorization. If the AccessToken model is publicly exposed, an attacker can create Authorization Tokens for any user as long as they know the target's userId. This will allow the attacker to access the user's data and their privileges.
Recommendation
For loopback 2.x, upgrade to version 2.40.0 or later For loopback 3.x, upgrade to version 3.22.0 or later
Пакеты
Наименование
loopback
npm
Затронутые версииВерсия исправления
<= 2.39.2
2.40.0
Наименование
loopback
npm
Затронутые версииВерсия исправления
>= 3.0.0, <= 3.21.0
3.22.0
Дефекты
CWE-285
Дефекты
CWE-285