-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User model login endpoint: security issue with possible query injection #4195
Comments
We may also use the "regexp" functionality to test multiple users without having to know their exact email: {
"email": {"regexp": "^a" },
"password": "anything you want"
} |
@gabjauf I tried both the payloads, I am getting 401. Can you elaborate the steps? |
Oh, I got what you mean. Taking a look. Thanks for reporting. |
@hacksparrow I was seeing a 401 as well - could you elaborate on 'I got what you mean'? |
The fix has been published last week in |
Great works guys, thanks 👍 |
Hello Loopback!
I found some kind of vulnerability on POST /Users/login route from the default User model:
Description/Steps to reproduce
Send the following to /Users/login as credentials
When inspecting the resulting user here
loopback/common/models/user.js
Line 254 in 4b3a3a3
Found in loopback v3.25.1
Expected result
We would expect the email to be forced as a string.
Feel free to reach me if my description is unclear 😄
The text was updated successfully, but these errors were encountered: