Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Major security threats #312

Closed
ClaudiuOctavianMuresan opened this issue Apr 15, 2022 · 15 comments
Closed

Major security threats #312

ClaudiuOctavianMuresan opened this issue Apr 15, 2022 · 15 comments

Comments

@ClaudiuOctavianMuresan
Copy link

Please have a look at CVE-2022-27261 and CVE-2022-27140

@richardgirges
Copy link
Owner

Please provide additional details. Thanks.

@ClaudiuMuresan
Copy link

The links to mentioned CVEs should contain all details. Do you need more info? The details from the CVEs clearly provide the target of the vulnerabilities : express-fileupload

@r3wt
Copy link
Contributor

r3wt commented Apr 18, 2022

@richardgirges Hi Richard, I reached out to the author of the attacks, Harun Oz, and asked him to contact you with the details. It's not clear from either video how the attack(s) work. Videos are from february, but just went into NIST on 4/12, which is kind of odd in my opinion.

@vishal-bypt
Copy link

Is there any ETA for CVE-2022-27261 and CVE-2022-27140 ?

@richardgirges
Copy link
Owner

@richardgirges Hi Richard, I reached out to the author of the attacks, Harun Oz, and asked him to contact you with the details. It's not clear from either video how the attack(s) work. Videos are from february, but just went into NIST on 4/12, which is kind of odd in my opinion.

Thanks @r3wt - exactly my thoughts

@richardgirges
Copy link
Owner

Because this is an unreviewed vulnerability and there are no relevant details explaining the attack, going to close this. Feel free to reopen when you have concrete and actionable information. Thanks!

@harunoz
Copy link

harunoz commented Apr 27, 2022

Dear all,

I sent a detailed explanation for each type of attack and potential countermeasures regarding our findings to a @richardgirges. I did not receive a response from him yet. Thanks.

@jeffpm
Copy link

jeffpm commented May 11, 2022

Any update on this?

@richardgirges
Copy link
Owner

Any PRs would be appreciated

@arxenix
Copy link

arxenix commented May 14, 2022

@richardgirges has @harunoz contacted you with the vulnerability details? is this a legitimate finding?

@richardgirges
Copy link
Owner

I am looking into Harun’s findings now. Many of his proposed solutions is to add numerous NPM dependencies to express-fileupload, in addition to introducing major breaking changes. This seems unideal.

I will need to spend some time looking deeply into the findings to see if there is a way to address them, and to determine if the scope of these issues should fall under the responsibility of the user or express-fileupload.

@duterte
Copy link
Contributor

duterte commented May 23, 2022

Its a bluff, There is no security issues. express-fileupload does not write file without calling mv() method so how does that going to overwrite server files ?

It's up to developer on how and where to write file.

@r3wt
Copy link
Contributor

r3wt commented May 23, 2022

Its a bluff, There is no security issues. express-fileupload does not write file without calling mv() method so how does that going to overwrite server files ?

It certainly seems that way. The video i saw featured a guy modifying files in notepad while uploading to localhost. i wanted to give the benefit of the doubt though and see if it was an actual vulnerability.

@richardgirges
Copy link
Owner

Its a bluff, There is no security issues. express-fileupload does not write file without calling mv() method so how does that going to overwrite server files ?

It's up to developer on how and where to write file.

I'm still reading through all of Harun's findings. Many of the issues in Harun's report appear to indicate intentional misusing of the API. Much of it overlaps with how the developer should be handling uploaded files and assumes express-fileupload should be handling the business logic of file renamings, etc - I'm not sure I agree with this.

There are some issues around safeFileNames that may be worthwhile to implement, but I need more time to confirm that these are legitimate security concerns that should fall under the purview of express-fileupload

@richardgirges
Copy link
Owner

Closing this ticket in favor of #316

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants