Impact
With some self-hosted configurations, attackers can register new accounts and upload files to arbitrary directories within the container. If the attacker uploads a Python script to the right location, they can execute arbitrary code within the container.
To be affected, ALL of the following must be true
- Self-hosted deployment (GrowthBook Cloud is unaffected)
- Using local file uploads (as opposed to S3 or Google Cloud Storage)
- NODE_ENV set to a non-production value
- JWT_SECRET set to an easily guessable string like "dev"
Patches
Patched in commit 1a5edff (2022-08-29)
Workarounds
Set JWT_SECRET environment variable to a long random string (as recommended in the docs). This will stop arbitrary file uploads, but the only way to stop attackers from registering accounts is by updating to the latest build.
References
PR that fixes the vulnerability - #487
For more information
If you have any questions or comments about this advisory:
Impact
With some self-hosted configurations, attackers can register new accounts and upload files to arbitrary directories within the container. If the attacker uploads a Python script to the right location, they can execute arbitrary code within the container.
To be affected, ALL of the following must be true
Patches
Patched in commit 1a5edff (2022-08-29)
Workarounds
Set
JWT_SECRETenvironment variable to a long random string (as recommended in the docs). This will stop arbitrary file uploads, but the only way to stop attackers from registering accounts is by updating to the latest build.References
PR that fixes the vulnerability - #487
For more information
If you have any questions or comments about this advisory: