Skip to content

Rate Limiting Bypass in express-brute

Moderate severity GitHub Reviewed Published Jun 7, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm express-brute (npm)

Affected versions

<= 1.0.1

Patched versions

None

Description

All versions of express-brute are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting.

Recommendation

No fix is currently available. Consider using an alternative module until a fix is made available.

References

Reviewed Jun 7, 2019
Published to the GitHub Advisory Database Jun 7, 2019
Last updated Jan 9, 2023

Severity

Moderate
5.6
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-984p-xq9m-4rjw

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.