An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
References
Link | Resource |
---|---|
https://github.com/node-formidable/formidable/issues/856 | Issue Tracking Third Party Advisory |
https://github.com/node-formidable/formidable/issues/862 | Exploit Issue Tracking Third Party Advisory |
https://github.com/strapi/strapi/issues/20189 | |
https://medium.com/%40zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 | |
https://www.youtube.com/watch?v=C6QPKooxhAo | Exploit Third Party Advisory |
https://github.com/node-formidable/formidable/issues/856 | Issue Tracking Third Party Advisory |
https://github.com/node-formidable/formidable/issues/862 | Exploit Issue Tracking Third Party Advisory |
https://github.com/strapi/strapi/issues/20189 | |
https://medium.com/%40zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 | |
https://www.youtube.com/watch?v=C6QPKooxhAo | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/node-formidable/formidable/issues/856 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/node-formidable/formidable/issues/862 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/strapi/strapi/issues/20189 - | |
References | () https://medium.com/%40zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 - | |
References | () https://www.youtube.com/watch?v=C6QPKooxhAo - Exploit, Third Party Advisory |
26 Apr 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability. |
02 Jun 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary | An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. | |
References |
|
24 May 2022, 19:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
References | (MISC) https://www.youtube.com/watch?v=C6QPKooxhAo - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:formidable_project:formidable:3.1.4:*:*:*:*:node.js:*:* | |
CWE | CWE-434 |
16 May 2022, 14:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-16 14:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29622
Mitre link : CVE-2022-29622
CVE.ORG link : CVE-2022-29622
JSON object : View
Products Affected
formidable_project
- formidable
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type