漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
multiparty vulnerable to ReDoS via filename parsing
Vulnerability Description
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the proxy or gateway layer reduces but does not eliminate the attack surface, since a small header of around 8 KB is sufficient to trigger the vulnerable backtracking. Upgrade to multiparty@4.3.0 or higher.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
CWE-1333
Vulnerability Title
multiparty 安全漏洞
Vulnerability Description
multiparty是pillarjs开源的一个解析HTTP multipart/form-data请求的Node.js模块。 multiparty 4.2.3及之前版本存在安全漏洞,该漏洞源于Content-Disposition文件名参数解析器中正则表达式回溯,可能导致特制多部分上传请求中长标头值使正则匹配耗时数秒,阻塞事件循环,导致拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A