GMS-2021-9: Unauthorized access through URL manipulation
Impact
The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation.
Patches
The vulnerability has been patched of the master
branch of the series, of the stable
branch. The Docker image on docker.io has been patched.
Workarounds
If upgrading is not possible, manually apply the changes of https://github.com/jhpyle/docassemble/commit/e3dbf6ce054b3c0310996f0657289f5eed0a73fe and restart the server (e.g., by pressing Save on the Configuration screen).
Credit
The vulnerability was discovered by Jim Platania of Seiso LLC (@jimmio).
For more information
If you have any questions or comments about this advisory:
- Open an issue in docassemble
- Join the Slack channel
- Email us at jhpyle@gmail.com
References
Detect and mitigate GMS-2021-9 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →