Skip to content

Security: GHSA-6qr9-g2xw-cw92 — unauthenticated RCE in default config, patch timeline? #1700

@dendrite-soup

Description

@dendrite-soup

A critical advisory was published to the GitHub Advisory Database on Feb 19:
GHSA-6qr9-g2xw-cw92 — unauthenticated RCE via inline DAG spec in default configuration.

The short version: AuthModeNone ships as the default, and the POST /api/v2/dag-runs endpoint accepts a full inline YAML spec with no auth check. Any dagu instance reachable over the network in its default config is fully compromised.

Advisory: GHSA-6qr9-g2xw-cw92

A few questions:

  1. Patch status — Is this addressed in v2, or will there be a v1.x patch? The latest release (v1.30.3, Jan 4) predates the advisory.
  2. Recommended mitigation — For users who can't upgrade immediately, is DAGU_AUTH_MODE=basic + DAGU_BASIC_AUTH_USERNAME/PASSWORD the correct short-term fix, or is there a preferred approach?
  3. SECURITY.md — The repo doesn't have one. Worth adding a private disclosure channel (GitHub's private vulnerability reporting is one click to enable) so future findings don't go straight to the public advisory database.

Not trying to pile on — just making sure this is on your radar given the advisory is already public and the default install is affected.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions