logo

CVE-2022-0528 @uppy/companion

Package

Manager: npm
Name: @uppy/companion
Vulnerable Version: >=0 <3.3.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00277 pctl0.50711

Details

Incorrect Authorization in @uppy/companion @uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name.

Metadata

Created: 2022-03-04T00:00:19Z
Modified: 2022-03-10T21:57:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-q24h-5rq3-63j9/GHSA-q24h-5rq3-63j9.json
CWE IDs: ["CWE-200", "CWE-863", "CWE-918"]
Alternative ID: GHSA-q24h-5rq3-63j9
Finding: F100
Auto approve: 1