A flaw was found in Prosody's HTTP file-serving module (mod_http_files) that allows it to serve requests outside of the configured public root directory. This could allow attackers access to private files including sensitive data. External References: https://prosody.im/security/advisory_20160108-1/
Affected configurations ----------------------- The default configuration has mod_http_files disabled, and is not vulnerable. Additionally, configurations where mod_http_files serves files at the root URL (e.g. not /files/ prefix, using http_paths) are not vulnerable. Temporary mitigation -------------------- Disable mod_http_files and any community modules that depend on it.
This has been fixed in: prosody-0.9.9-1.fc24 prosody-0.9.9-1.fc22 prosody-0.9.9-1.el5 prosody-0.9.9-1.fc23 prosody-0.9.9-1.el7 prosody-0.9.9-1.el6
prosody-0.9.9-2.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
prosody-0.9.9-2.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
prosody-0.9.9-2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
prosody-0.9.9-2.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
prosody-0.9.9-2.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.