Security vulnerability in coro-fs.

25 views
Skip to first unread message

Tim Caswell

unread,
Jan 22, 2019, 1:38:52 PM1/22/19
to lu...@googlegroups.com
If you have any code that depends on the .chroot() function in coro-fs, it was recently discovered that it didn't actually protect against escaping the chroot.

The most popular dependency I know of is the static asset loader for weblit.

The public https://luvit.io/ was vulnerable to this attack.  It's been patched and redeployed already.

A new version has been published.  Please update your app's deps and make sure you have coro-fs of at least version 2.2.2.

If you publish a CLI tool or an app to lit, keep in mind that all dependencies are a snapshot at time of publication.  All that's needed it to bump the version of your package and publish again and it will get a new set of all recursive dependencies in the new snapshot. (Make sure to test that none of the new libraries break your app).

-Tim Caswell
Reply all
Reply to author
Forward
0 new messages