Description
An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:18:39.230Z
Reserved: 2022-03-14T00:00:00.000Z
Link: CVE-2022-27140
No data.
Status : Modified
Published: 2022-04-12T17:15:09.887
Modified: 2024-11-21T06:55:13.750
Link: CVE-2022-27140
No data.
OpenCVE Enrichment
No data.
Weaknesses