CVE-2022-29622

An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:formidable_project:formidable:3.1.4:*:*:*:*:node.js:*:*

History

26 Apr 2024, 22:15

Type Values Removed Values Added
Summary (en) An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. (en) An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
References
  • () https://github.com/strapi/strapi/issues/20189 -

02 Jun 2022, 14:15

Type Values Removed Values Added
Summary An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled.
References
  • (MISC) https://medium.com/@zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 -
  • (MISC) https://github.com/node-formidable/formidable/issues/856 -
  • (MISC) https://github.com/node-formidable/formidable/issues/862 -

24 May 2022, 19:17

Type Values Removed Values Added
References (MISC) https://www.youtube.com/watch?v=C6QPKooxhAo - (MISC) https://www.youtube.com/watch?v=C6QPKooxhAo - Exploit, Third Party Advisory
CWE CWE-434
CPE cpe:2.3:a:formidable_project:formidable:3.1.4:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

16 May 2022, 14:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-16 14:15

Updated : 2024-05-17 02:08


NVD link : CVE-2022-29622

Mitre link : CVE-2022-29622

CVE.ORG link : CVE-2022-29622


JSON object : View

Products Affected

formidable_project

  • formidable
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type