Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-7783

Опубликовано: 18 июл. 2025
Источник: debian
EPSS Низкий

Описание

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-form-datafixed4.0.1-2package
node-form-datafixed4.0.0-1+deb12u1bookwormpackage

Примечания

  • https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4

  • Fixed by: https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0 (v4.0.4)

EPSS

Процентиль: 6%
0.00025
Низкий

Связанные уязвимости

ubuntu
3 месяца назад

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

CVSS3: 5.4
redhat
3 месяца назад

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

nvd
3 месяца назад

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

github
3 месяца назад

form-data uses unsafe random function in form-data for choosing boundary

EPSS

Процентиль: 6%
0.00025
Низкий