This appears to be patched in 2.6.1.40, but current Voxel is based on .2.5.2
Funnily. Really.
Latest GPL source codes from NG/DNI is 2.5.2.4, what I am able to use. But note:
NG/DNI are extremely laconic in their changes log and in description of found security vulnerability. But I suppose (my guessing) they had in the mind CVE in lighttpd prior to version 1.4.54.
https://www.cvedetails.com/vulnerability-list/vendor_id-2713/Lighttpd.html
I.e. CVE-2019-11072 with high score 7.5.
Stock version 2.5.2.4 uses lighttpd version 1.4.53 (i.e.
with security vulnerability) and 2.6.1.40 updated to 1.4.55 (fixed security vulnerability).
In my version lighttpd was upgraded to 1.4.54 yet in 9.2.5.1.10SF-HW (i.e. December 2019, more than year ago). In my current released version 9.2.5.2.9SF-HW (i.e. this thread): lighttpd version is 1.4.58.
And do not worry, there are a lot of more serious CVEs in the latest stock versions. So welcome back to the stock. Examples: CVE-2018-0739 (OpenSSL 1.0.2n, score 6.5), CVE-2018-9336/CVE-2018-7544 (OpenVPN 2.4.5, score 7.8 and 9.1(!)), CVE-2020-12762 (libjson-c 0.12, score: 7.8), CVE-2020-8177/ CVE-2020-8169 (curl 7.70.0, score 7.1 and 7.5) etc.
Look at scores above: 6.5, 7.8, 9.1, 7.8, 7.1, 7.5… And feel how much you are in safety using latest stock with “security fixes”.
All these CVEs are in the latest stock with “security fixes”. I do not talk re: kernel level CVE-2019-11477, CVE-2019-11478, CVE-2019-11479 fixed yet in my very first release. Really I do not have a time to enumerate all these vulnerabilities in the current stock versions (not only 2.6.xx but 2.7.xx too)…
At least all CVEs above are fixed in my build.
P.S.
Gold rule: do not allow WebGUI control from Internet. Most of NG/DNI “fixes” of security vulnerabilities are related to their WebGUI leaving all the rest CVEs intact. I hope most of you do not have hackers at your home…
Voxel.