Description
Your web application uses the Express.js server framework with case-insensitive routing enabled. This can lead to authentication bypass vulnerabilities when security controls are applied to routes based on string matching. By altering the case of the URL, an attacker can bypass authentication middleware applied to specific routes, gaining unauthorized access to protected resources.
Remediation
Enforce case-sensitive routing: Modify your Express.js application configuration to enforce case-sensitive routing. Additionally, ensure that your middleware functions are case-sensitive and can handle varying case scenarios. Regularly test and review your application's security controls to ensure they work as expected and do not contain bypass vulnerabilities.
References
Related Vulnerabilities
WordPress Plugin Import Export WordPress Users Security Bypass (1.3.8)
Drupal Core 9.1.x Multiple Security Bypass Vulnerabilities (9.1.0 - 9.1.12)
WordPress Plugin Easy Watermark Security Bypass (0.7.0)
WordPress Plugin Tutor LMS-eLearning and online course solution Security Bypass (2.7.0)
WordPress Plugin Phoenix Media Rename Security Bypass (3.4.2)