-
-
Notifications
You must be signed in to change notification settings - Fork 231
Open
Description
A critical advisory was published to the GitHub Advisory Database on Feb 19:
GHSA-6qr9-g2xw-cw92 — unauthenticated RCE via inline DAG spec in default configuration.
The short version: AuthModeNone ships as the default, and the POST /api/v2/dag-runs endpoint accepts a full inline YAML spec with no auth check. Any dagu instance reachable over the network in its default config is fully compromised.
Advisory: GHSA-6qr9-g2xw-cw92
A few questions:
- Patch status — Is this addressed in v2, or will there be a v1.x patch? The latest release (v1.30.3, Jan 4) predates the advisory.
- Recommended mitigation — For users who can't upgrade immediately, is
DAGU_AUTH_MODE=basic+DAGU_BASIC_AUTH_USERNAME/PASSWORDthe correct short-term fix, or is there a preferred approach? - SECURITY.md — The repo doesn't have one. Worth adding a private disclosure channel (GitHub's private vulnerability reporting is one click to enable) so future findings don't go straight to the public advisory database.
Not trying to pile on — just making sure this is on your radar given the advisory is already public and the default install is affected.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels