Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. gun
  4. ›
  5. GMS-2019-29

GMS-2019-29: High severity vulnerability that affects gun

June 5, 2019 (updated September 7, 2021)

Urgent Upgrade

The static file server module included with GUN had a serious vulnerability:

  • Using curl --path-as-is allowed reads on any parent directory or files.

This did not work via the browser or via curl without as-is option.

Fixed

This has been fixed since version 0.2019.416 and higher.

Who Was Effected?

Most NodeJS users who use the default setup, such as:

  • npm start
  • node examples/http.js
  • Heroku 1-click-deploy
  • Docker
  • Now

If you have a custom NodeJS code then you are probably safe unless you have something like require('http').createServer(Gun.serve(__dirname)) in it.

If you have not upgraded, it is mandatory or else it is highly likely your environment variables and AWS (or other) keys could be leaked.

Credit

It was reported and fixed by JK0N, but I did not understand the --path-as-is condition.

Joonas Loppi from function61 rediscovered it and explained the urgency to me to fix it.

References

  • github.com/advisories/GHSA-886v-mm6p-4m66
  • github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66

Code Behaviors & Features

Detect and mitigate GMS-2019-29 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.2019.416

Fixed versions

  • 0.2019.416

Solution

Upgrade to version 0.2019.416 or above.

Source file

npm/gun/GMS-2019-29.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:13 +0000.