-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This repo (and all forks) have major security vulnerabilities #892
Comments
This is very important. Appreciate it. Would disabling "Share Chat" functionality temporarily fix it? |
@The-1818 yea that seems like a great approach -- don't think the chat/document ids are in any other endpoints |
Thanks @bfischer1121 . I'm disappointed to read Vercel's stance. I run an AI chatbot based startup, and I pay for Vercel. I've downloaded this repo to investigate what 'best-in-class' looks like and re-assess my own repo accordingly. Seeing that security is not a priority is extremely concerning! @jeremyphilemon , hello! The response that @bfischer1121 posted from Vercel (I appreciate probably not you!) seems peculiar and inappropriate. |
@bfischer1121 can you please explain the second vulnerability that still exists, here? |
Really surprised they that didn't chose to close both issues and move on, this is one of their most popular repos. |
Hey @bfischer1121, thanks so much for flagging this! As mentioned in the response you had received earlier from Vercel, it does seem like it's tricky to communicate these changes to the community when there is no concept of versioning. Although tricky, I don't think it's an impossible problem to solve. Since this template has received an unprecedented amount of forks and has been deployed by many developers, it’s fair to set the expectation that the template meets a baseline level of security and transparency around changes. As a result, I'll be shipping the following improvements to help build more trust and security:
Let me know what you think, and I appreciate you for nudging us to do better! |
Jeremy for the win |
@jeremyphilemon that's awesome, thanks so much for these improvements and the quality of your response! |
@bfischer1121 can you share more details around the second vulnerability? I checked
|
@jeremyphilemon yea for this one the starting point is on the POST method with general flow being: |
hey @jeremyphilemon I would like to add some of the suggestions from #898 — can you share your thoughts? Are some of the suggestions things you plan to implement as part of the improvements you mentioned? |
All products based on this repo have the following vulnerabilities:
I responsibly disclosed these to the Vercel team, and they addressed the first vulnerability with this commit, but will not communicate that to you.
The 2nd vulnerability is still active in this repo, and all forks.
They refuse to communicate these security issues with the community, so I'm doing so here.
Here is their viewpoint on the matter:
If you are building a product using this repo as a basis, know that their official viewpoint is that there is no reasonable expectation of security and, when issues are found, they will not be communicated to you.
Happy to disclose more about these vulnerabilities in this thread if needed. Cheers!
The text was updated successfully, but these errors were encountered: