-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Vulnerability: any application have access to change IPFS settings #7406
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thank you for submitting your first issue to this repository! A maintainer will be here shortly to triage and review.
Finally, remember to use https://discuss.ipfs.io if you just need general support. |
On localhost, via an origin restricted API, yes. Along with other commands like Are you're running on a shared environment? |
(i'm not the original poster) i think this needs to be (partially) redesigned in general. most modern operating systems are multi-user and while sharing block data may not be a security/privacy issue, sharing the mfs state certainly is. |
Well, as a workaround you can just unix sockets to restrict the API access to certain users on a machine. :) |
actually it's not closed. please, do api as a unix-socket by default (while a config is being generated). it's a vulnerability-issue . so safety must be by default |
Version information:
go-ipfs v0.5.1
Description:
I found serious vulnerability: any application and any user have access to change IPFS settings through the API.
Hope you fix it.
The text was updated successfully, but these errors were encountered: