This is an automated archive made by the Lemmit Bot.

The original was posted on /r/selfhosted by /u/GreatRoxy on 2025-01-16 21:19:27+00:00.


Hello,

I just wanted to let you know about something serious I came across. While using zipline, I found a big security issue with the OAuth2 setup (specifically with Google), and it’s super important to update right away to keep your accounts safe.

Vulnerability Details:

  • Affected Versions: Anything past v3.6.0, including v3.7.10.
  • Impact: An issue in the OAuth2 fallback logic allowed account hijacking. If two Google accounts share the same username prefix (e.g., [email protected] and [email protected]), they could end up pointing to the same account in Zipline. This means someone could easily access another user’s data.
  • Affected Features:
    • Users who enabled the following settings are especially vulnerable:
        FEATURES_OAUTH_LOGIN_ONLY=true
        OAUTH_BYPASS_LOCAL_LOGIN=true

These settings, which should increase security by disabling password logins, unfortunately weakened security in this case due to the OAuth fallback logic issue.

What You Should Do:

  • Update Immediately: Upgrade to the latest version of Zipline (v3.7.11 or higher) to ensure your accounts are secure.
  • If You’re Not Using OAuth2: You’re safe, but still consider updating for other improvements.

My Experience:

I discovered this issue and reported it to the Zipline team via their GitHub repository. I’m happy to say that the developer quickly acknowledged the problem and implemented a fix in record time. The latest release (v3.7.11) resolves the issue, so it’s critical for users to update immediately.

It’s quite surprising that such a critical issue existed. The fallback logic essentially bypassed a key security mechanism, leaving users’ data at risk.

For those interested, you can view the updated code that addresses this issue here: GitHub Commit Fix