HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an unauthenticated attacker can upload arbitrary files to the upload storage backend including HTML, JS and PHP files. The problem is patched in HedgeDoc 1.7.1. You should however verify that your uploaded file storage only contains files that are allowed, as uploaded files might still be served. As workaround it's possible to block the `/uploadimage` endpoint on your instance using your reverse proxy. And/or restrict MIME-types and file names served from your upload file storage.
References
Link | Resource |
---|---|
https://github.com/hedgedoc/hedgedoc/commit/e9306991cdb5ff2752c1eeba3fedba42aec3c2d8 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1 | Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-wcr3-xhv7-8gxc | Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/commit/e9306991cdb5ff2752c1eeba3fedba42aec3c2d8 | Patch Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1 | Third Party Advisory |
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-wcr3-xhv7-8gxc | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hedgedoc/hedgedoc/commit/e9306991cdb5ff2752c1eeba3fedba42aec3c2d8 - Patch, Third Party Advisory | |
References | () https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1 - Third Party Advisory | |
References | () https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-wcr3-xhv7-8gxc - Third Party Advisory |
Information
Published : 2020-12-29 00:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26286
Mitre link : CVE-2020-26286
CVE.ORG link : CVE-2020-26286
JSON object : View
Products Affected
hedgedoc
- hedgedoc
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type