Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/treeverse/lakefs
  4. ›
  5. GMS-2023-1838

GMS-2023-1838: lakeFS vulnerable to Arbitrary JavaScript Injection via Direct Link to HTML Files

August 14, 2023

Impact

The browser renders the resulting HTML when opening a direct link to an HTML file via lakeFS. Any JavaScript within that page is executed within the context of the domain lakeFS is running in. An attacker can inject a malicious script inline, download resources from another domain, or make arbitrary HTTP requests. This would allow the attacker to send information to a random domain or carry out lakeFS operations while impersonating the victim.

Note that to carry out this attack, an attacker must already have access to upload the malicious HTML file to one or more repositories. It also depends on the victim receiving and opening the link to the malicious HTML file.

Patches

This is fixed in lakeFS version 0.106.0

Workarounds

There are no known workarounds at this time.

References

  • github.com/advisories/GHSA-9phh-r37v-34wh
  • github.com/treeverse/lakeFS/commit/2b2a9fa156ad80b0aac043e17533b546b1800603
  • github.com/treeverse/lakeFS/releases/tag/v0.106.0
  • github.com/treeverse/lakeFS/security/advisories/GHSA-9phh-r37v-34wh

Code Behaviors & Features

Detect and mitigate GMS-2023-1838 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.106.0

Fixed versions

  • v0.106.0

Solution

Upgrade to version 0.106.0 or above.

Source file

go/github.com/treeverse/lakefs/GMS-2023-1838.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:08 +0000.