Vulnerability Description
An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Express-Fileupload Project | Express-Fileupload | 1.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134Third Party Advisory
- https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387Third Party Advisory
- https://www.youtube.com/watch?v=4XpofFi84KIExploitThird Party Advisory
- https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134Third Party Advisory
- https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387Third Party Advisory
- https://www.youtube.com/watch?v=4XpofFi84KIExploitThird Party Advisory
FAQ
What is CVE-2022-27140?
CVE-2022-27140 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the ...
How severe is CVE-2022-27140?
CVE-2022-27140 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-27140?
Check the references section above for vendor advisories and patch information. Affected products include: Express-Fileupload Project Express-Fileupload.