Description
HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an unauthenticated attacker can upload arbitrary files to the upload storage backend including HTML, JS and PHP files. The problem is patched in HedgeDoc 1.7.1. You should however verify that your uploaded file storage only contains files that are allowed, as uploaded files might still be served. As workaround it's possible to block the `/uploadimage` endpoint on your instance using your reverse proxy. And/or restrict MIME-types and file names served from your upload file storage.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-wcr3-xhv7-8gxc
Third Party Advisory x_refsource_misc
https://github.com/hedgedoc/hedgedoc/releases/tag/1.7.1
Patch, Third Party Advisory x_refsource_misc
https://github.com/hedgedoc/hedgedoc/commit/e9306991cdb5ff2752c1eeba3fedba42aec3c2d8
Scores
CVSS v3
7.5
EPSS
0.0131
EPSS Percentile
79.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-434
Status
published
Products (1)
hedgedoc/hedgedoc
< 1.7.1
Published
Dec 29, 2020
Tracked Since
Feb 18, 2026