Vulnerability Description
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Express-Fileupload Project | Express-Fileupload | < 1.1.8 |
| Netapp | Max Data | - |
Related Weaknesses (CWE)
References
- https://github.com/richardgirges/express-fileupload/issues/236ExploitThird Party Advisory
- https://security.netapp.com/advisory/ntap-20200821-0003/Third Party Advisory
- https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969ExploitThird Party Advisory
- https://github.com/richardgirges/express-fileupload/issues/236ExploitThird Party Advisory
- https://security.netapp.com/advisory/ntap-20200821-0003/Third Party Advisory
- https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969ExploitThird Party Advisory
FAQ
What is CVE-2020-7699?
CVE-2020-7699 is a vulnerability with a CVSS score of 7.5 (HIGH). This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
How severe is CVE-2020-7699?
CVE-2020-7699 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7699?
Check the references section above for vendor advisories and patch information. Affected products include: Express-Fileupload Project Express-Fileupload, Netapp Max Data.