An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
References
Link | Resource |
---|---|
https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134912967 | Third Party Advisory |
https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387288644 | Third Party Advisory |
https://www.youtube.com/watch?v=4XpofFi84KI | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-04-12 17:15
Updated : 2024-05-17 02:07
NVD link : CVE-2022-27140
Mitre link : CVE-2022-27140
CVE.ORG link : CVE-2022-27140
JSON object : View
Products Affected
express-fileupload_project
- express-fileupload
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type