-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
fix(core): Prevent XSS via static cache dir #10339
Conversation
const { n8nFolder } = Container.get(InstanceSettings); | ||
const restrictedPaths = [n8nFolder]; | ||
const { n8nFolder, staticCacheDir } = Container.get(InstanceSettings); | ||
const restrictedPaths = [n8nFolder, staticCacheDir]; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would it be possible to have a test for this?
packages/cli/BREAKING-CHANGES.md
Outdated
|
||
### What changed? | ||
|
||
The `N8N_RESTRICT_FILE_ACCESS_TO` environment variable now also blocks access to n8n's static cache directory at `~/.cache/n8n/public`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't this be N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀
Test summaryRun details
Flakiness
This comment has been generated by cypress-bot as a result of this project's GitHub integration settings. You can manage this integration in this project's settings in the Cypress Cloud |
✅ All Cypress E2E specs passed |
* master: fix(core): Prevent XSS via static cache dir (#10339) fix(editor): Enable credential sharing between all types of projects (#10233) refactor(core): Extract webhook request handler to own file (#10301) feat: Allow sharing to and from team projects (no-changelog) (#10144) refactor(editor): Convert ChangePasswordModal to composition api (no-changelog) (#10337) docs: Change display name for WhatsApp Trigger API Credential (#10334) fix(core): Do not load ScalingService in regular mode (no-changelog) (#10333) docs: Update wording in X credentials (#10327) fix(editor): Fixing XSS vulnerability in toast messages (#10329) fix(core): Rate limit MFA activation and verification endpoints (#10330) refactor(core): Decouple emailing and workflow sharing from internal hooks (no-changelog) (#10326) refactor(core): Stop reporting disk I/O error to Sentry (no-changelog) (#10324)
Got released with |
https://linear.app/n8n/issue/SEC-61/241-persistent-cross-site-scripting