pyodide sandbox option is insecure
Description
Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. One such method runs them in pyodide, but pyodide on node does not have a useful sandbox barrier. If a user of Grist sets GRIST_SANDBOX_FLAVOR to pyodide and opens a malicious document, that document could run arbitrary processes on the server hosting Grist. The problem has been addressed in Grist version 1.7.9 and up, by running pyodide under deno. As a workaround, a user can use the gvisor-based sandbox by setting GRIST_SANDBOX_FLAVOR to gvisor.
Affected products
1- Range: 1.3.1, 1.3.2, v0.7.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/gristlabs/grist-core/security/advisories/GHSA-7xvx-8pf2-pv5gmitrex_refsource_CONFIRM
- support.getgrist.com/self-managed/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.