An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:18:39.230Z
Reserved: 2022-03-14T00:00:00
Link: CVE-2022-27140
No data.
Status : Modified
Published: 2022-04-12T17:15:09.887
Modified: 2024-11-21T06:55:13.750
Link: CVE-2022-27140
No data.
OpenCVE Enrichment
No data.
Weaknesses