An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-12T00:00:00
Updated: 2024-08-03T05:18:39.230Z
Reserved: 2022-03-14T00:00:00
Link: CVE-2022-27140
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-04-12T17:15:09.887
Modified: 2024-11-21T06:55:13.750
Link: CVE-2022-27140
Redhat
No data.