Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTY3Y3gtcmhocS1tZmhx
High severity vulnerability that affects indico
Local file disclosure through LaTeX injection
Impact
An external audit of the Indico codebase has discovered a vulnerability in Indico's LaTeX sanitization code, which could have malicious users to run unsafe LaTeX commands on the server. Such commands allowed for example to read local files (e.g. indico.conf
).
As far as we know it is not possible to write files or execute code using this vulnerability.
Patches
You need to update to Indico 2.2.3 as soon as possible.
We also released Indico 2.1.10 in case you cannot update to 2.2 for some reason.
See https://docs.getindico.io/en/stable/installation/upgrade/ for instructions on how to update.
Workarounds
Setting XELATEX_PATH = None
in indico.conf
will result in an error when building a PDF, but without being able to run xelatex, the vulnerability cannot be abused.
For more information
If you have any questions or comments about this advisory:
- Open a thread in our forum
- Email us privately at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTY3Y3gtcmhocS1tZmhx
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 5 years ago
Updated: about 2 years ago
Identifiers: GHSA-67cx-rhhq-mfhq
References:
- https://github.com/indico/indico/security/advisories/GHSA-67cx-rhhq-mfhq
- https://github.com/advisories/GHSA-67cx-rhhq-mfhq
Blast Radius: 0.0
Affected Packages
pypi:indico
Dependent packages: 21Dependent repositories: 10
Downloads: 2,202 last month
Affected Version Ranges: >= 2.2.0, < 2.2.3, < 2.1.10
Fixed in: 2.2.3, 2.1.10
All affected versions: 0.98.0, 0.98.1, 0.98.2, 1.1.1, 1.1.2, 1.2.1, 1.2.2, 2.0.1, 2.0.2, 2.0.3, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.2.1, 2.2.2
All unaffected versions: 2.1.10, 2.1.11, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 3.0.1, 3.0.2, 3.0.3, 3.1.1, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.2.6, 3.2.7, 3.2.8, 3.2.9, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5