Arbitrary Code Execution via Modified JSON Name Field in socket.io-file Package (Unsupported Versions)
CVE-2020-24807 · HIGH Severity
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Learn more about our Web Application Penetration Testing UK.