Skip to content

Conversation

hekike
Copy link
Member

@hekike hekike commented May 19, 2022

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

merge advice

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
critical severity 776/1000
Why? Recently disclosed, Has a fix available, CVSS 9.8
Arbitrary File Upload
SNYK-JS-FORMIDABLE-2838956
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: formidable The new version differs by 250 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-FORMIDABLE-2838956
@kolbma
Copy link

kolbma commented May 27, 2022

Do you check your pull requests, before opening?!

formidable 3.2.4 is an ESM module and for this it won't work without changing code in restify plugins.

And the more important is... is there a need for updating because of this snyk report, which doesn't seem to say much, and the CVE also. Air of importance.
This comes from an anonymous guy who thinks it would be a problem if there are filenames with html-tags.
Well the problem is if you as developer put these filenames unchecked on a website, but not if you send these files e.g. per mail.
So can you trust the filename of an uploaded file per webform, of course not. Like you can't trust any data put in any form field.

There is a need for updating formidable, because version 1 isn't supported any longer.
But as started, this needs more than updating a version number.

@kolbma
Copy link

kolbma commented May 27, 2022

Btw. version 1.2.6 filters the extension with .[a-z0-9]* and cuts off anything behind.
So this problem starts with v2 and the "fix" in v3.2.4 is far more dangerous. Uploads of .txt files with "right" filenames would be saved as .bat or .exe files and if you provide these files to your users of the web apps they might get executed, although you have blocked these extension by a filter. But the "magic" rename happens after the custom filter checks.

@mmarchini mmarchini closed this Nov 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants