
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in flitto express-param up to version 0.x, identified as CVE-2017-20160. The vulnerability affects an unknown part of the file lib/ component (NVD).
The vulnerability was addressed through improvements to the fetchParams functionality. The changes included protection against HTTP Parameter Pollution attacks and the addition of new type options (int, float) for parameters. The fix also included adding geo-info to extra options and modifying how parameter values are handled when multiple values are present (GitHub PR).
The vulnerability was classified as critical, potentially affecting applications using the flitto express-param library. The exact impact details were not fully disclosed in the available sources.
The vulnerability was fixed in a later release of the express-param library. The fix included changes to parameter handling and type validation, particularly addressing HTTP Parameter Pollution attacks. The solution involved implementing stricter parameter type checking and adding new type options for better parameter validation (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."