The issue has been patched in Lima in version 0.16.0 by prohibiting using a backing file path in the VM base image. Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file. As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via `/dev/rdiskN`. To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the qcow2 (or vmdk) backing file path string. The official templates of Lima and the well-known third party products (Colima, Rancher Desktop, and Finch) are unlikely to be affected by this issue. Prior to version 0.16.0, a virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host. Lima launches Linux virtual machines, typically on macOS, for running containerd. If an app requires upload of files with HTML file extensions, the option can be set to `` or another custom value to override the default. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. The fix included in versions 5.4.4 and 6.1.1 adds a new Parse Server option `fileUpload.fileExtensions` to restrict file upload on Parse Server by file extension. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain.Īn additional security issue arises when the Parse JavaScript SDK is used. The URL of the the uploaded HTML could be shared for phishing attacks. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. A malicious user could upload an HTML file to Parse Server via its public API. Versions prior to 5.4.4 and 6.1.1 are vulnerable to a phishing attack vulnerability that involves a user uploading malicious files. Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |