| Título | Jawher Kl node-api-postgres 2.5 Unrestricted File Upload |
|---|
| Descripción | A Critical Unrestricted File Upload vulnerability exists in the node-api-postgres application. In index.js, the POST /users/:id/profile-picture endpoint utilizes a locally instantiated multer configuration that completely omits the fileFilter and size limitations enforced elsewhere in the application. It preserves the original file extension using path.extname() and serves uploaded content statically via the /uploads directory. An attacker can bypass intended image restrictions to upload dangerous file types (such as .html or executable scripts), leading to Stored Cross-Site Scripting (XSS) or potential Remote Code Execution (RCE) depending on the server environment. |
|---|
| Fuente | ⚠️ https://hackmd.io/@YzU_KiOzT86cEbFQdBceVg/Bk56LQQYbe |
|---|
| Usuario | yeee3642 (UID 91336) |
|---|
| Sumisión | 2026-03-02 16:16 (hace 2 meses) |
|---|
| Moderación | 2026-03-14 23:40 (12 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 351098 [JawherKl node-api-postgres hasta 2.5 Profile Picture index.js path.extname escalada de privilegios] |
|---|
| Puntos | 20 |
|---|