CVE-2026-41180
🟡 Monitoruj
W PsiTransfer występuje luka umożliwiająca nieautoryzowane tworzenie plików konfiguracyjnych.
CVSS
7.5
EPSS
0.0%
Exploit
none
Vendor
Opis źródłowy (NVD)
PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename prefixes a startup-loaded JavaScript path, such as `conf`, an unauthenticated attacker can create `config.<NODE_ENV>.js` in the application root. The attacker-controlled file is then executed on the next process restart. Version 2.4.3 contains a patch.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-23 02:16:15 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 21:08:02 UTC |
Referencje
- https://github.com/psi-4ward/psitransfer/commit/8b547bf3e09757122efa00aab90281e3915aa0c6 (security-advisories@github.com)
- https://github.com/psi-4ward/psitransfer/releases/tag/v2.4.3 (security-advisories@github.com)
- https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-533q-w4g6-5586 (security-advisories@github.com)