Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
updated 1 week, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    27 packages
    • flare
    • flarectl
    • photoflare
    • cloudflared
    • flare-floss
    • gotlsaflare
    • flare-signal
    • flaresolverr
    • cloudflare-cli
    • cloudflare-ddns
    • cloudflare-warp
    • cloudflare-utils
    • cloudflare-dyndns
    • speed-cloudflare-cli
    • cloudflare-dynamic-dns
    • octodns-providers.cloudflare
    • python312Packages.cloudflare
    • python313Packages.cloudflare
    • python314Packages.cloudflare
    • prometheus-cloudflare-exporter
    • terraform-providers.cloudflare
    • haskellPackages.hs-opentelemetry-instrumentation-cloudflare
    • gnomeExtensions.cloudflare-warp-toggle
    • home-assistant-component-tests.cloudflare
    • terraform-providers.cloudflare_cloudflare
    • tests.home-assistant-component-tests.cloudflare
    • tests.home-assistant-component-tests.cloudflare_r2
  • @mweinelt dismissed
Flare has a Path Traversal in /api/avatars/[filename]

Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to 1.7.3, an authenticated path traversal vulnerability in /api/avatars/[filename] allows any logged-in user to read arbitrary files from within the application container. The filename URL parameter is passed to path.join() without sanitization, and getFileStream() performs no path validation, enabling %2F-encoded ../ sequences to escape the uploads/avatars/ directory and read any file accessible to the nextjs process under /app/. Authentication is enforced by Next.js middleware. However, on instances with open registration enabled (the default), any attacker can self-register and immediately exploit this. This vulnerability is fixed in 1.7.3.

Affected products

Flare
  • ==< 1.7.3
Ignored packages (27)
Not in nixpkgs