Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hotfix for file download vulnerability #1864

Closed
wants to merge 1 commit into from

Conversation

leblowl
Copy link
Collaborator

@leblowl leblowl commented Sep 27, 2023

A malicious user can overwrite another user's files if they supply a filename that escapes the download directory (e.g. ../../../profile.sh). Prevent this by using UUIDs for filenames for now and revisit this in the future.

Pull Request Checklist

  • I have linked this PR to related GitHub issue.
  • I have updated the CHANGELOG.md file with relevant changes (the file is located at the root of monorepo).

A malicious user can overwrite another user's files if they supply a
filename that escapes the download directory (e.g.
../../../profile.sh). Prevent this by using UUIDs for filenames for
now and revisit this in the future.
@leblowl
Copy link
Collaborator Author

leblowl commented Oct 5, 2023

These changes were back merged from master: c7b4ce3

@leblowl leblowl closed this Oct 5, 2023
@siepra siepra deleted the pr-1.9.2-hotfix-file-download-path branch December 8, 2023 12:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants