EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the npm multiparty package. The affected software includes npm/multiparty versions 4.2.3 and lower. The vulnerabilities identified are denial of service via regular expression backtracking in the Content-Disposition filename parameter parser, denial of service via uncaught exception, and denial of service via prototype pollution leading to uncaught exception. These vulnerabilities pose a significant business risk as they can cause a service accepting multipart uploads via multiparty to become unavailable, resulting in downtime and potential financial losses. The impact of these vulnerabilities is high, with potential consequences including data loss, system crashes, and compromised business operations.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the npm multiparty package. The affected software includes npm/multiparty versions 4.2.3 and lower. The vulnerabilities identified are denial of service via regular expression backtracking in the Content-Disposition filename parameter parser, denial of service via uncaught exception, and denial of service via prototype pollution leading to uncaught exception. These vulnerabilities pose a significant business risk as they can cause a service accepting multipart uploads via multiparty to become unavailable, resulting in downtime and potential financial losses. The impact of these vulnerabilities is high, with potential consequences including data loss, system crashes, and compromised business operations.[emaillocker id="1283"]
These vulnerabilities pose a significant business risk, with potential consequences including data loss, system crashes, and compromised business operations. Exploitation of these vulnerabilities can result in downtime and potential financial losses, making it essential for organizations to address these issues promptly.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-65x3-rw7q-gx94
https://github.com/advisories/GHSA-xh3c-6gcq-g4rv
https://github.com/advisories/GHSA-qxch-whhj-8956