Description
Your web application uses the Express.js server framework with case-insensitive routing enabled. This can lead to authentication bypass vulnerabilities when security controls are applied to routes based on string matching. By altering the case of the URL, an attacker can bypass authentication middleware applied to specific routes, gaining unauthorized access to protected resources.
Remediation
Enforce case-sensitive routing: Modify your Express.js application configuration to enforce case-sensitive routing. Additionally, ensure that your middleware functions are case-sensitive and can handle varying case scenarios. Regularly test and review your application's security controls to ensure they work as expected and do not contain bypass vulnerabilities.
References
Related Vulnerabilities
WordPress Plugin Data Tables Generator by Supsystic Security Bypass (1.10.25)
WordPress Plugin Thrive Quiz Builder Security Bypass (2.3.9.3)
Apache OFBiz Authentication Bypass (CVE-2023-51467)
Drupal Core 9.4.x Security Bypass (9.4.0 - 9.4.2)
WordPress Plugin Advanced AJAX Product Filters Security Bypass (1.3.6.1)