CVE-2022-31041

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-31041
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31041.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-31041
Related
  • GHSA-h85r-xv4w-cg8g
Published
2022-06-13T13:15:13Z
Modified
2025-01-15T02:21:23.982294Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Open Forms is an application for creating and publishing smart forms. Open Forms supports file uploads as one of the form field types. These fields can be configured to allow only certain file extensions to be uploaded by end users (e.g. only PDF / Excel / ...). The input validation of uploaded files is insufficient in versions prior to 1.0.9 and 1.1.1. Users could alter or strip file extensions to bypass this validation. This results in files being uploaded to the server that are of a different file type than indicated by the file name extension. These files may be downloaded (manually or automatically) by staff and/or other applications for further processing. Malicious files can therefore find their way into internal/trusted networks. Versions 1.0.9 and 1.1.1 contain patches for this issue. As a workaround, an API gateway or intrusion detection solution in front of open-forms may be able to scan for and block malicious content before it reaches the Open Forms application.

References

Affected packages

Git / github.com/open-formulieren/open-forms

Affected ranges

Type
GIT
Repo
https://github.com/open-formulieren/open-forms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.0
1.0.0-rc.0
1.0.0-rc.1
1.0.0-rc.2
1.0.0-rc.3
1.0.0-rc.4
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.1.0
1.1.0-rc.0
1.1.0-rc.1

Other

POC
before-sdk
demodam
eherkenning-test-4
issue-1428
logius-report
mvp
sprint-10
sprint-11
sprint-4
sprint-5
sprint-6
sprint-7
sprint-8
sprint-9
still-functional
tag-push-test