An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability.
References
Link | Resource |
---|---|
https://github.com/node-formidable/formidable/issues/856 | Issue Tracking Third Party Advisory |
https://github.com/node-formidable/formidable/issues/862 | Exploit Issue Tracking Third Party Advisory |
https://github.com/strapi/strapi/issues/20189 | |
https://medium.com/%40zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022 | |
https://www.youtube.com/watch?v=C6QPKooxhAo | Exploit Third Party Advisory |
Configurations
History
26 Apr 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability. | |
References |
|
07 Nov 2023, 03:46
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-05-16 14:15
Updated : 2024-08-03 07:15
NVD link : CVE-2022-29622
Mitre link : CVE-2022-29622
CVE.ORG link : CVE-2022-29622
JSON object : View
Products Affected
formidable_project
- formidable
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type