An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.youtube.com/watch?v=4XpofFi84KI | third party advisory exploit |
https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387288644 | third party advisory |
https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134912967 | third party advisory |