express-cart@1.0.1 vulnerabilities

A fully functioning Node.js shopping cart with Stripe, PayPal and Authorize.net payments.

Direct Vulnerabilities

Known vulnerabilities in the express-cart package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Cross-site Request Forgery (CSRF)

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to missing checks in the Admin API, allowing attackers to add an administrator account, add a discount code or perform other unspecified behavior.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade express-cart to version 1.1.11 or higher.

<1.1.11
  • M
Cross-site Request Forgery (CSRF)

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via admin.js.

How to fix Cross-site Request Forgery (CSRF)?

A fix was pushed into the master branch but not yet published.

*
  • M
Cross-site Scripting (XSS)

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allows a user to insert malicious payload in the user input field and the script gets reflected in the browser.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for express-cart.

*
  • H
SQL Injection

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to SQL Injection due to a lack of user input sanitization in the login handlers. An attacker could enumerate the email address of the customers and the administrators.

How to fix SQL Injection?

Upgrade express-cart to version 1.1.8 or higher.

<1.1.8
  • C
Privilege Escalation

express-cart is a fully functioning Node.js shopping cart with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Privilege Escalation. Users from expressCart could add new users as administrators to the application due to deficiency in the access control.

How to fix Privilege Escalation?

Upgrade express-cart to version 1.1.6 or higher.

<1.1.6
  • C
Privilege Escalation

express-cart is a fully functioning Node.js shopping cart with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Privilege Escalation. Users from expressCart could add new users as administrators to the application due to deficiency in the access control.

How to fix Privilege Escalation?

Upgrade express-cart to version 1.1.6 or higher.

<1.1.6
  • C
Arbitrary Code Execution

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows a privileged users to upload files to the server, and choose which path it'll be saved in. The path does not do through validation, nor is the file type or size validated. This may allow an attacker to upload malicious files that may execute code on the server, send data back to the attacker or cause a denial of service.

How to fix Arbitrary Code Execution?

Upgrade express-cart to version 1.1.7 or higher.

<1.1.7
  • C
Arbitrary Code Execution

express-cart is a fully functional shopping cart built in Node.js (Express, MongoDB) with Stripe, PayPal and Authorize.net payments.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows a privileged users to upload files to the server, and choose which path it'll be saved in. The path does not do through validation, nor is the file type or size validated. This may allow an attacker to upload malicious files that may execute code on the server, send data back to the attacker or cause a denial of service.

How to fix Arbitrary Code Execution?

Upgrade express-cart to version 1.1.7 or higher.

<1.1.7