An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled.
Mend Note: After conducting further research, Mend has determined that this is a controversial case - Mend security team suggest to refer to it as a risky feature and not as critical vulnerability
This issue has been automatically marked as stale because it has not had any recent activity. It will be closed if no further activity occurs. Thank you for your contributions 🙏.
CVE-2022-29622 - High Severity Vulnerability
Vulnerable Library - formidable-2.0.1.tgz
A node.js module for parsing form data, especially file uploads.
Library home page: https://registry.npmjs.org/formidable/-/formidable-2.0.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/formidable/package.json
Dependency Hierarchy: - git-en-boite-smoke-tests-0.0.0.tgz (Root Library) - supertest-6.2.2.tgz - superagent-7.1.1.tgz - :x: **formidable-2.0.1.tgz** (Vulnerable Library)
Found in base branch: main
Vulnerability Details
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Mend Note: After conducting further research, Mend has determined that this is a controversial case - Mend security team suggest to refer to it as a risky feature and not as critical vulnerability
Publish Date: 2022-05-16
URL: CVE-2022-29622
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2022-05-16
Fix Resolution: formidable - 3.2.4