Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. express-brute
  4. ›
  5. GMS-2019-24

GMS-2019-24: Rate Limiting Bypass in express-brute

June 7, 2019 (updated August 4, 2021)

All versions of express-brute are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting. No fix is currently available. Consider using an alternative module until a fix is made available.

References

  • github.com/AdamPflug/express-brute/issues/46
  • github.com/advisories/GHSA-984p-xq9m-4rjw
  • snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457
  • www.npmjs.com/advisories/823

Code Behaviors & Features

Detect and mitigate GMS-2019-24 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.0.1

Solution

Unfortunately, there is no solution available yet.

Source file

npm/express-brute/GMS-2019-24.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:03 +0000.