Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
multiparty vulnerable to Denial of Service via Prototype Pollution leading to Uncaught Exception
Vulnerability Description
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or toString, the parser invokes .push() on the inherited prototype value rather than an array, throwing a TypeError that propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未捕获的异常
Vulnerability Title
multiparty 安全漏洞
Vulnerability Description
multiparty是pillarjs开源的一个解析HTTP multipart/form-data请求的Node.js模块。 multiparty 4.2.3及之前版本存在安全漏洞,该漏洞源于未捕获异常,可能导致拒绝服务攻击。
CVSS Information
N/A
Vulnerability Type
N/A