CVE-2024-57082

6.5 MEDIUM

📋 TL;DR

A prototype pollution vulnerability in the lib.createUploader function of @rpldy/uploader v1.8.1 allows attackers to supply crafted payloads that can cause Denial of Service (DoS) by crashing the application. This affects any application using this specific version of the uploader library. The vulnerability requires an attacker to be able to send malicious upload requests to the affected endpoint.

💻 Affected Systems

Products:
  • @rpldy/uploader
Versions: v1.8.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using the vulnerable version of the library with upload functionality exposed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application unavailability due to DoS, potentially disrupting business operations and user access.

🟠

Likely Case

Temporary service disruption affecting upload functionality, requiring application restart to recover.

🟢

If Mitigated

Minimal impact with proper input validation and request filtering in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in the referenced GitHub gist. Exploitation requires sending crafted upload requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.8.2 or later

Vendor Advisory: https://github.com/rpldy/react-uploady/releases

Restart Required: Yes

Instructions:

1. Update @rpldy/uploader to v1.8.2 or later using npm update @rpldy/uploader. 2. Restart the application. 3. Verify the fix by checking the package.json version.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject malformed upload requests before they reach the vulnerable function.

Rate Limiting

all

Apply rate limiting to upload endpoints to reduce impact of DoS attempts.

🧯 If You Can't Patch

  • Implement WAF rules to block requests with suspicious payload patterns targeting prototype pollution.
  • Isolate upload functionality to separate services with limited blast radius.

🔍 How to Verify

Check if Vulnerable:

Check package.json or node_modules/@rpldy/uploader/package.json for version 1.8.1.

Check Version:

npm list @rpldy/uploader

Verify Fix Applied:

Confirm version is 1.8.2 or later in package.json and test upload functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or restarts following upload requests
  • Unusual error messages related to prototype pollution or object manipulation

Network Indicators:

  • Spike in upload requests with unusual payload sizes or patterns
  • Requests containing crafted JSON objects targeting object prototypes

SIEM Query:

source="application.logs" AND ("prototype pollution" OR "uploader crash" OR "DoS")

🔗 References

📤 Share & Export