Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: sftpgo

Found 2 matching suggestions

View:
Compact
Detailed
Untriaged
created 1 month, 1 week ago Activity log
  • Created suggestion
SFTPGo improperly sanitizes placeholders in group home directories/key prefixes

SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions before v2.7.1 contain an input validation issue in the handling of dynamic group paths, for example, home directories or key prefixes. When a group is configured with a dynamic home directory or key prefix using placeholders like %username%, the value replacing the placeholder is not strictly sanitized against relative path components. Consequently, if a user is created with a specially crafted username the resulting path may resolve to a parent directory instead of the intended sub-directory. This issue is fixed in version v2.7.1

Affected products

sftpgo
  • ==>= 2.3.0, < 2.7.1

Matching in nixpkgs

pkgs.sftpgo

Fully featured and highly configurable SFTP server

Package maintainers

Untriaged
created 1 month, 1 week ago Activity log
  • Created suggestion
SFTPGo has a Path Traversal and Permission Bypass via Path Normalization Discrepancy

SFTPGo is an open source, event-driven file transfer solution. In SFTPGo versions prior to 2.7.1, a path normalization discrepancy between the protocol handlers and the internal Virtual Filesystem routing can lead to an authorization bypass. An authenticated attacker can craft specific file paths to bypass folder-level permissions or escape the boundaries of a configured Virtual Folder. This vulnerability is fixed in 2.7.1.

Affected products

sftpgo
  • ==< 2.7.1

Matching in nixpkgs

pkgs.sftpgo

Fully featured and highly configurable SFTP server

Package maintainers