Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. docassemble
  4. ›
  5. GMS-2021-9

GMS-2021-9: Unauthorized access through URL manipulation

May 6, 2021

Impact

The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation.

Patches

The vulnerability has been patched of the master branch of the series, of the stable branch. The Docker image on docker.io has been patched.

Workarounds

If upgrading is not possible, manually apply the changes of https://github.com/jhpyle/docassemble/commit/e3dbf6ce054b3c0310996f0657289f5eed0a73fe and restart the server (e.g., by pressing Save on the Configuration screen).

Credit

The vulnerability was discovered by Jim Platania of Seiso LLC (@jimmio).

For more information

If you have any questions or comments about this advisory:

  • Open an issue in docassemble
  • Join the Slack channel
  • Email us at jhpyle@gmail.com

References

  • github.com/advisories/GHSA-qrmm-w4v4-q7f8
  • github.com/jhpyle/docassemble/security/advisories/GHSA-qrmm-w4v4-q7f8

Code Behaviors & Features

Detect and mitigate GMS-2021-9 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.2.65

Fixed versions

  • 1.2.65

Solution

Upgrade to version 1.2.65 or above.

Source file

pypi/docassemble/GMS-2021-9.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:43 +0000.