The Nginx configuration file shipped with Passbolt Pro Edition (Docker container, Virtual Machine image, Installation script) and the Docker container of Passbolt Community Edition exposes files outside the application web root directory, creating a confidentiality issue for multiple directories and non php files.
Passbolt users using Nginx configuration file provided by passbolt are requested to review and update their configuration accordingly. The file location depends on the baseline system but most likely it is located in:
The new default configuration file can be found on github: https://github.com/passbolt/passbolt_docker/blob/master/conf/passbolt.conf
Attack vector / exploitation
An attacker could access information stored in non php files such as tmp, logs or config by guessing the url of that file. An attacker could gain valuable information from the logs and cache files if they manage to guess their urls.
How did you find out about it?
This configuration mistake failed to be seen during the initial review but was caught during a routine check of our configuration files.
I am using apache am I affected?
No this only affect servers using nginx.
Do I need to change my server keys?
Most likely no. The server key is used for the server verification step which impact is limited: it will mostly help in the case your server domain name is seized. If this is not a serious threat for you, you do not need to take action.
Changing your server key currently is not practical, it would require all your users to perform an account recovery which is obviously not desirable. In the future we will provide a system for you to push a new key directly to your user.
- 2018-05-08 23:00 CET: Vulnerability details found during a routine check as part of v2.0.5 release.
- 2018-05-08 09:00 PM CET: We deploy a new configuration file on CE/PRO VM, Docker containers.
- 2018-05-09 19:00 PM CET: We publish this notice and update the release notes with this report