HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an unauthenticated attacker can upload arbitrary files to the upload storage backend including HTML, JS and PHP files. The problem is patched in HedgeDoc 1.7.1. You should however verify that your uploaded file storage only contains files that are allowed, as uploaded files might still be served. As workaround it's possible to block the `/uploadimage` endpoint on your instance using your reverse proxy. And/or restrict MIME-types and file names served from your upload file storage.
References
Link | Resource |
---|---|
https://github.com/hedgedoc/hedgedoc/commit/e9306991cdb5ff2752c1eeba3fedba42aec3c2d8 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1 | Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-wcr3-xhv7-8gxc | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-12-28T23:25:13
Updated: 2020-12-28T23:25:13
Reserved: 2020-10-01T00:00:00
Link: CVE-2020-26286
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-29T00:15:12.593
Modified: 2020-12-30T16:14:55.197
Link: CVE-2020-26286
JSON object: View
Redhat Information
No data.
CWE