Hi Pieter,

On Wed, May 06, 2026 at 07:00:45AM +0200, Pieter Lenaerts wrote:
> Thanks.
> 
> I'm assuming, based on nothing but my own judgement, that users don't often
> expose their beets library externally using this web UI. Even if they do, this
> vulnerability is not very practical for attackers to exploit as they should
> poison a library with malicious code in music metadata fields. Or something.
> 
> Therefore, I think this is a low risk vulnerability.
> 
> Upstream reports this is fixed in their commit
> https://github.com/beetbox/beets/commit/75f0d8f4899e61afb939adf02dcfb078aed23a6a
> 
> I will update the package to 2.10 in unstable with DD sponsorship from the
> python team.
> 
> I will try to prepare stable updates for bullseye to trixie in branches in
> salsa. I will try to backport this commit and provide a test confirming proper
> escaping of field input.
> 
> I'm not a DD, so I do not have upload access. I propose I work on the above 
> and
> report on my progress here. I think I will need a couple of days, maybe until
> the end of the weekend to propose fixes.
> 
> Please jump in if any of the above does not sound okay.

FWIW, I agree with you, and just uploading the fixing version to
unstable is good. For stable and oldstable I believe it does not need
a security update, we will mark it no-dsa in the security tracker. If
you mean to fix it in stable and olstable doing it via a upcoming
point release would be sufficient.

Thanks for working on it,

Regards,
Salvatore

Reply via email to