Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-7783

Опубликовано: 18 июл. 2025
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

A vulnerability related to predictable random number generation has been discovered in the form-data JavaScript library. The library utilizes Math.random() to determine boundary values for multipart form-encoded data. This presents a security risk if an attacker can observe other values generated by Math.random() within the target application and simultaneously control at least one field of a request made using form-data. Under these conditions, the attacker could potentially predict or determine the boundary values. This predictability could be leveraged to bypass security controls, manipulate form data, or potentially lead to data integrity issues or other forms of exploitation.

Отчет

This flaw does not affect host systems. The impact of this vulnerability is limited to specific applications which integrate the form-data library. As a result the impact of this CVE is limited on RedHat systems.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4cryostat/cryostat-openshift-console-plugin-rhel9Affected
Cryostat 4io.cryostat-cryostatNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Affected
Migration Toolkit for Applications 7mta/mta-ui-rhel9Affected
Migration Toolkit for Containersrhmtc/openshift-migration-ui-rhel8Affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-console-plugin-rhel9Affected
Migration Toolkit for Virtualizationmtv-candidate/mtv-console-plugin-rhel9Affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel9Affected
Network Observability Operatornetwork-observability/network-observability-console-plugin-compat-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-330
https://bugzilla.redhat.com/show_bug.cgi?id=2381959form-data: Unsafe random function in form-data

EPSS

Процентиль: 5%
0.00024
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

ubuntu
около 1 месяца назад

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

nvd
около 1 месяца назад

Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

debian
около 1 месяца назад

Use of Insufficiently Random Values vulnerability in form-data allows ...

github
около 1 месяца назад

form-data uses unsafe random function in form-data for choosing boundary

EPSS

Процентиль: 5%
0.00024
Низкий

5.4 Medium

CVSS3