GMS-2019-29: High severity vulnerability that affects gun
(updated )
Urgent Upgrade
The static file server module included with GUN had a serious vulnerability:
- Using
curl --path-as-is
allowed reads on any parent directory or files.
This did not work via the browser or via curl without as-is option.
Fixed
This has been fixed since version 0.2019.416
and higher.
Who Was Effected?
Most NodeJS users who use the default setup, such as:
npm start
node examples/http.js
Heroku
1-click-deployDocker
Now
If you have a custom NodeJS code then you are probably safe unless you have something like require('http').createServer(Gun.serve(__dirname))
in it.
If you have not upgraded, it is mandatory or else it is highly likely your environment variables and AWS (or other) keys could be leaked.
Credit
It was reported and fixed by JK0N, but I did not understand the --path-as-is
condition.
Joonas Loppi from function61 rediscovered it and explained the urgency to me to fix it.
References
Detect and mitigate GMS-2019-29 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →