Vulnerability identifier: #VU113173
Vulnerability risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID:
CWE-ID:
CWE-330
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
form-data
Web applications /
JS libraries
Vendor: FormData
Description
The vulnerability allows a remote attacker to perform parameter injection attacks.
The vulnerability exists due to software uses a weak Math.random() method to generated random values for multipart form-encoded data. A remote attacker can observe values produced by Math.random in the target application and predict the random number used to generate form-data's boundary value and inject arbitrary parameters into requests.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
form-data: 2.0.0, 2.1.0 - 2.1.4, 2.2.0, 2.3.0 - 2.3.2, 2.4.0, 2.5.0 - 2.5.4, 3.0.0 - 3.0.4, 4.0.0 - 4.0.4
External links
https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0
https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?