Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
updated 1 week, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package gnomeExtensions.openwispr-gnome-extension
  • @mweinelt dismissed
Path Traversal in wisp.serve_static allows arbitrary file read

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in gleam-wisp wisp allows arbitrary file read via percent-encoded path traversal. The wisp.serve_static function is vulnerable to path traversal because sanitization runs before percent-decoding. The encoded sequence %2e%2e passes through string.replace unchanged, then uri.percent_decode converts it to .., which the OS resolves as directory traversal when the file is read. An unauthenticated attacker can read any file readable by the application process in a single HTTP request, including application source code, configuration files, secrets, and system files. This issue affects wisp: from 2.1.1 before 2.2.1.

Affected products

wisp
  • <2.2.1
  • <pkg:hex/wisp@2.2.1
gleam-wisp/wisp
  • <161118c431047f7ef1ff7cabfcc38981877fdd93
  • <pkg:github/gleam-wisp/wisp@161118c431047f7ef1ff7cabfcc38981877fdd93
Ignored packages (1)

pkgs.gnomeExtensions.openwispr-gnome-extension

AI-powered voice-to-text dictation for GNOME. Requires the openwispr companion engine service for recording/transcription. Uses clipboard copy/paste for output (optional auto-paste). Optional remote STT/LLM requests are sent only to user-configured providers.

  • nixos-unstable 3
    • nixpkgs-unstable 3
    • nixos-unstable-small 3
Not in nixpkgs