Release v2.0.3 - Fix arbitrary PHP file inclusion & self-XSS vulnerabilities #1710
Replies: 1 comment 3 replies
-
Vulnerability updatesAs the comments for the advisories are closed when they are published, here some updates. I've re-added the detailed impact analysis results here to also transparently explain in the open for the community what we have analyzed (the commends in the advisories by maintainers are private/they cannot see them). While I like the summary at the top, IMHO, it's also important to explain that we carefully considered attack vectors here and analyzed it as best as we could (because this e.g. also impacts the score/rating). CVEs are being requested from GitHub and hopefully shall be assigned in the next days. I'd suggest we also add these to the release notes/website then again, as they are the no 1 thing people search for, so they should find our reports e.g. and it's clear what vulnerability belongs to which CVEs. (Companies use that to evaluate how fast they should update etc. e.g.) |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
This release addresses issues with arbitrary PHP file inclusion when enabling template switching and lacking sanitation of file names when drag-&-dropping files into PrivateBin with malicious filenames. Security advisories with additional details will be published soon and linked here.
This discussion was created from the release Release v2.0.3 - Fix arbitrary PHP file inclusion & self-XSS vulnerabilities.
Beta Was this translation helpful? Give feedback.
All reactions