Description
Your web application uses the Express.js server framework with case-insensitive routing enabled. This can lead to authentication bypass vulnerabilities when security controls are applied to routes based on string matching. By altering the case of the URL, an attacker can bypass authentication middleware applied to specific routes, gaining unauthorized access to protected resources.
Remediation
Enforce case-sensitive routing: Modify your Express.js application configuration to enforce case-sensitive routing. Additionally, ensure that your middleware functions are case-sensitive and can handle varying case scenarios. Regularly test and review your application's security controls to ensure they work as expected and do not contain bypass vulnerabilities.
References
Related Vulnerabilities
WordPress Plugin Events Widgets For Elementor And The Events Calendar Security Bypass (1.4.3)
Joomla! Core Security Bypass (2.5.0 - 3.9.27)
WordPress Plugin Social Share Icons & Social Share Buttons Security Bypass (3.0.2)
WordPress Plugin Search Exclude Security Bypass (1.2.2)
WordPress Plugin Thrive Themes Builder Security Bypass (2.2.3)