by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
15 packages
- go-outline
- mdbook-pdf-outline
- python312Packages.outlines
- python313Packages.outlines
- typstPackages.suboutline_0_1_0
- typstPackages.suboutline_0_2_0
- typstPackages.suboutline_0_3_0
- mplus-outline-fonts.osdnRelease
- python312Packages.outlines-core
- python313Packages.outlines-core
- python314Packages.outlines-core
- mplus-outline-fonts.githubRelease
- pkgsRocm.python3Packages.outlines
- typstPackages.outline-summaryst_0_1_0
- pkgsRocm.python3Packages.outlines-core
- @LeSuisse accepted
- @LeSuisse published on GitHub
Outline Affected an Arbitrary File Read via Path Traversal in JSON Import
Outline is a service that allows for collaborative documentation. Prior to 1.4.0, during the JSON import process, the value of attachments[].key from the imported JSON is passed directly to path.join(rootPath, node.key) and then read using fs.readFile without validation. By embedding path traversal sequences such as ../ or absolute paths, an attacker can read arbitrary files on the server and import them as attachments. This vulnerability is fixed in 1.4.0.
References
-
https://github.com/outline/outline/security/advisories/GHSA-7r4f-3wjv-83xf x_refsource_CONFIRM
-
https://github.com/outline/outline/releases/tag/v1.4.0 x_refsource_MISC
Affected products
outline
- ==< 1.4.0
Package maintainers
-
@cab404 Vladimir Serov <cab404@mailbox.org>
-
@xanderio Alexander Sieg <alex@xanderio.de>
-
@yrd Yannik Rödel <nix@yannik.info>
-
@blitz Julian Stecklina <js@alien8.de>
-
@snue Stefan Nuernberger <kabelfrickler@gmail.com>