HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an unauthenticated attacker can upload arbitrary files to the upload storage backend including HTML, JS and PHP files. The problem is patched in HedgeDoc 1.7.1. You should however verify that your uploaded file storage only contains files that are allowed, as uploaded files might still be served. As workaround it's possible to block the `/uploadimage` endpoint on your instance using your reverse proxy. And/or restrict MIME-types and file names served from your upload file storage.
References
Link | Resource |
---|---|
https://github.com/hedgedoc/hedgedoc/commit/e9306991cdb5ff2752c1eeba3fedba42aec3c2d8 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1 | Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-wcr3-xhv7-8gxc | Third Party Advisory |
Configurations
Information
Published : 2020-12-28 16:15
Updated : 2020-12-30 08:14
NVD link : CVE-2020-26286
Mitre link : CVE-2020-26286
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
hedgedoc
- hedgedoc