This affects the package unisharp/laravel-filemanager prior to version 2.6.2. The upload() function does not sufficiently validate the file type when uploading.
An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution
**Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the here.
{
"severity": "MODERATE",
"github_reviewed_at": "2022-01-04T18:05:21Z",
"cwe_ids": [
"CWE-434"
],
"nvd_published_at": "2021-12-17T20:15:00Z",
"github_reviewed": true
}