Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestion detail

Untriaged
created 1 month ago
Flare has a Path Traversal in /api/avatars/[filename]

Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to 1.7.3, an authenticated path traversal vulnerability in /api/avatars/[filename] allows any logged-in user to read arbitrary files from within the application container. The filename URL parameter is passed to path.join() without sanitization, and getFileStream() performs no path validation, enabling %2F-encoded ../ sequences to escape the uploads/avatars/ directory and read any file accessible to the nextjs process under /app/. Authentication is enforced by Next.js middleware. However, on instances with open registration enabled (the default), any attacker can self-register and immediately exploit this. This vulnerability is fixed in 1.7.3.

Affected products

Flare
  • ==< 1.7.3

Matching in nixpkgs

pkgs.flare

Fantasy action RPG using the FLARE engine

  • nixos-unstable 1.14
    • nixpkgs-unstable 1.14
    • nixos-unstable-small 1.14
  • nixos-25.11 1.14
    • nixos-25.11-small 1.14
    • nixpkgs-25.11-darwin 1.14

pkgs.photoflare

Cross-platform image editor with a powerful features and a very friendly graphical user interface

pkgs.flare-floss

Automatically extract obfuscated strings from malware

pkgs.gotlsaflare

Update TLSA DANE records on cloudflare from x509 certificates

pkgs.cloudflare-dyndns

CloudFlare Dynamic DNS client

  • nixos-unstable 5.4
    • nixpkgs-unstable 5.4
    • nixos-unstable-small 5.4
  • nixos-25.11 5.4
    • nixos-25.11-small 5.4
    • nixpkgs-25.11-darwin 5.4

Package maintainers