Offcanvas top

Download

Release v1.4.13

This release, v1.4.13, is a security release to fix a security issue in the rule package process.

  • Fixed an SSRF security issue in the rule package process, found and reported by pyuysig, Yuming Zhang, and Song Li of Zhejiang University via the security advisories.
  • Updated the translations for multiple languages.

We’re thankful for the analysis and reporting by pyuysig, Yuming Zhang, and Song Li. Thank you for using the security advisories to report the issue to us in private. We’re also thankful for all other contributions, like translations.

We recommend to update to v1.4.13 as soon as you can.

Details of the security issue

Description of the security issue

The rule package process allowed redirects and accessing private networks. This can be used to mount an attack on mosparo, especially via the APIs and the web cron job routes. With this method, an attacker can bypass the allowlists configured in mosparo (Administration -> Security settings) and make requests to these routes, even if the allowlists protect them.

Risk assessment

The risk of this security issue in the rule package process is manageable. The attacker cannot use this method to obtain any information from mosparo. All routes except one are protected by authentication. The only directly exposed API is the health check, which provides no data other than the system status. The attacker can only request a route; the response from the request is not visible to the user. The biggest issues with this security issue are two things:

  1. It is possible to map the routes and therefore detect the version of a mosparo installation.
  2. It is possible to overload the server if the web cron job is active and the attacker knows its secret key.

For an attacker to use this security issue, the following requirements need to be met:

  • The attacker needs a non-administrative user in your mosparo installation with the Owner or Editor role. Administrative users (users with the “Is administrator” role) can already see all this information in the administration area and gain no benefit from this method.
  • The allowlists need to be configured in the Administration -> Security settings. Otherwise, the routes are exposed to the internet anyway, and there is no benefit in using this security issue (except for accessing the health check API).
  • You need to have enabled the web cron job, and the attacker needs to know the secret key for it; otherwise, overloading the web server by calling it is not possible.

Changes to mitigate the security issue

The following changes resolve the security issue:

  • Redirects are no longer followed, and private networks are no longer accessible by the rule package process. This solves the problem completely because, for the attack method, the process must follow the redirects.
  • A non-administrative user will no longer see the exact error message when adding a rule package. The user will see an error message, but the message is the same across all error cases.
  • A minimum refresh interval of 1 hour is applied to all rule packages, making this attack method even more unusable.

It is possible to allow redirects and access to private networks, and to adjust the minimum refresh interval using newly added environment variables.

With the release of version 1.4.13, we’re applying new default values that prevent redirects and private network access, enforce a minimum refresh interval, and replace specific error messages with general ones for non-administrative users.

Download hosted by GitHub
SHA1: 6b2b1cc8b5148652229ca7964b2434bb9c603fa9

Release v1.4.12

This release contains a security bug fix, a small enhancement, and a UI fix.

  • Since version 1.4.0, the field value has not been properly escaped, which could lead to a potential XSS issue.
  • On the submission detail page, we added two buttons to navigate to the newer and older submissions. Suggested by Pink_Imagination
  • Fixed a small UI issue with icons in buttons
  • Updated the translations.
Download hosted by GitHub
SHA1: 8731bc3561984124f319bffba7ebbf9df6b9261f

Release v1.4.11

Version 1.4.11 is a maintenance release that updates all backend dependencies and fixes a typo.

  • Updated symfony/process to mitigate CVE-2026-24739 on Windows, reported by Tekka27
  • Updated all the other backend dependencies
  • Fixed a small typo in one of the strings, reported by ExeQue

Thank you very much for your reports and help to make mosparo better!

Download hosted by GitHub
SHA1: 4ffe7fdebeeafeb0827f46d711eac8d6dcf77140

Release v1.4.10

The release v1.4.10 is a bug fix and a (minor) enhancement release. It includes three bug fixes and a rule type enhancement.

  • Added two new subtypes for the Word rule type: “Exact word” and “Entire field”. Suggested and inspired by winkelement in #382. Learn more about these in the documentation.
  • Using 0.0 as a rating value for a rule item was not correctly processed. Reported by winkelement in #391.
  • Fixed an undefined variable in the import process.
  • Added a special validation for too high subnet suffixes in the rule editor.

Thank you, winkelement, and all our other contributors, for your contributions!

Download hosted by GitHub
SHA1: 27079a7678adecdfa66ea31d5349f35718ae8864

Release v1.4.9

In this version, we fixed an issue with the standard Docker image and updated the translations.

  • Fixed an issue with the standard Docker image with the `public/resources` directory, introduced in the last version (v1.4.8). Reported by softlion in #388.
  • Updated the Italian and Polish translations provided by our contributors.
  • Fixed the name “mosparo” in some of the translation files.

Thank you for your contributions and help in making mosparo better!

Download hosted by GitHub
SHA1: 16082de0870ba89fa0886b6c1f4d8095b58dd7ce
Load more
Loading...