| |
Vulnerability CVE-2014-7193
Published: 2014-12-25
Description: |
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site that is visited by an application consumer. |
Type:
CWE-284 (Improper Access Control)
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.8/10 |
4.9/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
None |
References: |
https://nodesecurity.io/advisories/crumb_cors_token_disclosure
https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|