-
-
Notifications
You must be signed in to change notification settings - Fork 682
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Filename filtering is inappropriate #862
Comments
Got here as SCA blocked the build of one of our services due to the CVE referenced earlier. I've reached out to both NVD and MEND asking them to look into this and hopefully get the CVE removed as the vulnerability report is literally a joke. The YouTube video attached as proof to the CVE only proves that the person who submitted the vulnerability report is incompetent and that NVD has a serious quality control issue when it comes to vulnerability submissions. |
Thanks for the support @kolbma @keymandll, I think in the very same way. I just got email from Daniel from Mend, and responded with the same narrative. We are low-level library and we intentionally do it that way, but provide extensions and options. It's a developer's job to ensure that better. We are not end-user service or whatever. |
No worries @tunnckoCore . Great news and big respect to Daniel from Mend for reaching out to you. I'm still trying to explain to MITRE that the vuln report is false and on MITRE's end there's been a serious misunderstanding re @GrosSacASac 's comment: |
|
@ShawnLee2018 updates are near. Use |
What is SCA ? The code from before already removed some characters from the file extension. But not always. So it was inconsistent. The characters that are considered invalid inside a file extension are all except the . numbers and a-Z. Do you want to change that ? Yes/No ? We can also change the algorithm to filter invalid characters instead of cutting off at the first invalid. Yes/No ? |
@GrosSacASac Never mind. I'm perfectly happy now due to the security analysis I performed the industry slowly started realising that Formidable was not vulnerable in the first place. (SCA is Software Composition Analysis.) |
I came across your filename handling and filtering with the CVE-2022-29622 and this issue
#856 (comment)_
First you got blamed also inappropriate by this CVE-2022-29622 whoever is responsible for publishing this without correct approval.
Filenames of forms can have html-tags and js-like-text, like any other form inputs and it is the responsibility of the lib user to handle this, because only he/she knows where this filename is used and what is a safety risc. All this filtering and replacement makes it worse, because the original filename of upload gets lost.
Why I've opened this issue: Now your current code of formidable has some filename filtering which is dysfunctional.
This is an example you can put in e.g. https://replit.com/languages/nodejs
The code is from your current master https://github.com/node-formidable/formidable/blob/master/src/Formidable.js and I've added some asserts to show the problem.
The text was updated successfully, but these errors were encountered: