Skip to content

High severity vulnerability that affects gun

High severity GitHub Reviewed Published Jun 4, 2019 in amark/gun • Updated Jan 9, 2023

Package

npm gun (npm)

Affected versions

< 0.2019.416

Patched versions

0.2019.416

Description

Urgent Upgrade

The static file server module included with GUN had a serious vulnerability:

  • Using curl --path-as-is allowed reads on any parent directory or files.

This did not work via the browser or via curl without as-is option.

Fixed

This has been fixed since version 0.2019.416 and higher.

Who Was Effected?

Most NodeJS users who use the default setup, such as:

  • npm start
  • node examples/http.js
  • Heroku 1-click-deploy
  • Docker
  • Now

If you have a custom NodeJS code then you are probably safe unless you have something like require('http').createServer(Gun.serve(__dirname)) in it.

If you have not upgraded, it is mandatory or else it is highly likely your environment variables and AWS (or other) keys could be leaked.

Credit

It was reported and fixed by JK0N, but I did not understand the --path-as-is condition.

Joonas Loppi from function61 rediscovered it and explained the urgency to me to fix it.

References

@amark amark published to amark/gun Jun 4, 2019
Published to the GitHub Advisory Database Jun 5, 2019
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-886v-mm6p-4m66

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.