Skip to content

Unauthorized access through URL manipulation

High severity GitHub Reviewed Published May 5, 2021 in jhpyle/docassemble • Updated Jan 9, 2023

Package

pip docassemble (pip)

Affected versions

< 1.2.65

Patched versions

1.2.65

Description

Impact

The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation.

Patches

The vulnerability has been patched in version 1.2.65 of the master branch, version 1.1.113 of the 1.1.x series, and version 1.0.12 of the stable branch. The Docker image on docker.io has been patched.

Workarounds

If upgrading is not possible, manually apply the changes of jhpyle/docassemble@e3dbf6c and restart the server (e.g., by pressing Save on the Configuration screen).

Credit

The vulnerability was discovered by Jim Platania of Seiso LLC (@jimmio).

For more information

If you have any questions or comments about this advisory:

References

@jhpyle jhpyle published to jhpyle/docassemble May 5, 2021
Reviewed May 5, 2021
Published to the GitHub Advisory Database May 6, 2021
Last updated Jan 9, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-qrmm-w4v4-q7f8

Source code

No known source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.