You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A bug made it possible for an authenticated user to save user-controlled content to any file on the server. This could result in an (authenticated) RCE. This is not possible via the UI but only via direct API calls.
Note: The user have to be authenticated in order to take advantage of this vulnerability.
This bug was introduced with how the path for the upload functionality was generated from user supplied data.
How to check your deployment:
Check the SQL database for any index with a name that is not a UUID4 hex string.
This is mitigated from release 20230526. We fixed the path construction bug and added validation of the index name. See PR for details: #2763
The text was updated successfully, but these errors were encountered:
A bug made it possible for an authenticated user to save user-controlled content to any file on the server. This could result in an (authenticated) RCE. This is not possible via the UI but only via direct API calls.
Note: The user have to be authenticated in order to take advantage of this vulnerability.
This bug was introduced with how the path for the upload functionality was generated from user supplied data.
How to check your deployment:
This is mitigated from release 20230526. We fixed the path construction bug and added validation of the index name. See PR for details: #2763
The text was updated successfully, but these errors were encountered: