Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g5hg-p3ph-g8qg

Опубликовано: 05 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

Multer vulnerable to Denial of Service via unhandled exception

Impact

A vulnerability in Multer versions >=1.4.4-lts.1, <2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process.

Patches

Users should upgrade to 2.0.1

Workarounds

None

References

https://github.com/expressjs/multer/commit/35a3272b611945155e046dd5cef11088587635e9 https://github.com/expressjs/multer/issues/1233 https://github.com/expressjs/multer/pull/1256

Пакеты

Наименование

multer

npm
Затронутые версииВерсия исправления

>= 1.4.4-lts.1, < 2.0.1

2.0.1

EPSS

Процентиль: 17%
0.00055
Низкий

8.7 High

CVSS4

Дефекты

CWE-248

Связанные уязвимости

CVSS3: 5.3
redhat
16 дней назад

Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to `2.0.1` to receive a patch. No known workarounds are available.

nvd
15 дней назад

Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to `2.0.1` to receive a patch. No known workarounds are available.

EPSS

Процентиль: 17%
0.00055
Низкий

8.7 High

CVSS4

Дефекты

CWE-248