Arbitrary Code Execution via Modified JSON Name Field in socket.io-file Package (Unsupported Versions)

Arbitrary Code Execution via Modified JSON Name Field in socket.io-file Package (Unsupported Versions)

CVE-2020-24807 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Learn more about our Web Application Penetration Testing UK.