Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
multiparty vulnerable to ReDoS via filename parsing
Vulnerability Description
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the proxy or gateway layer reduces but does not eliminate the attack surface, since a small header of around 8 KB is sufficient to trigger the vulnerable backtracking. Upgrade to multiparty@4.3.0 or higher.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
CWE-1333
Vulnerability Title
multiparty 安全漏洞
Vulnerability Description
multiparty是pillarjs开源的一个解析HTTP multipart/form-data请求的Node.js模块。 multiparty 4.2.3及之前版本存在安全漏洞,该漏洞源于Content-Disposition文件名参数解析器中正则表达式回溯,可能导致特制多部分上传请求中长标头值使正则匹配耗时数秒,阻塞事件循环,导致拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A