CVE-2022-29622: Formidable arbitrary file upload
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.96721%
CWE
Published
5/17/2022
Updated
5/1/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
formidable | npm | < 3.2.4 | 3.2.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from filename handling in Formidable's parsing logic. The GitHub PR #857 specifically modifies _getExtension to address extension validation, replacing a problematic regex with character-by-character validation. The _getFileName function's handling of quoted filenames and HTML entity decoding (shown in issue #862's test case) could allow crafted filenames to bypass security checks. While the vulnerability is disputed due to Formidable's intended low-level nature, these functions represent the technical root of the alleged vulnerability when used with default/unsafe configurations.