Files
dokku/docs
Jose Diaz-Gonzalez a70728f61e fix: sanitize openresty include filenames to prevent eval injection
Add defense-in-depth sanitization for OpenResty include files to prevent
OS command injection via malicious filenames that break shell quoting in eval.

- Add filename validation in core-post-extract using regex [^a-zA-Z0-9_.-]
- Validate both http-includes and location-includes paths
- Abort deploy via dokku_log_fail on unsafe filenames
- Skip non-regular files (symlinks, directories) during extraction
- Add security regression test with unsafe filename containing space
- Keep existing guards in docker-args-process-deploy as belt-and-suspenders
- Update documentation to clarify allowed filename characters

Addresses CVSS 9.9 vulnerability where filenames like poc'$(cmd)'x.conf
could escape shell quoting and execute arbitrary commands during deploy.
2026-05-09 12:20:50 -04:00
..
2026-05-07 17:29:53 +00:00
2026-05-07 17:29:53 +00:00
2026-05-07 17:29:53 +00:00
2026-05-07 17:29:53 +00:00
2026-05-07 17:29:53 +00:00
2026-05-07 17:29:53 +00:00

Dokku Documentation

This documentation covers the installation, configuration, and usage of Dokku - a Docker-powered PaaS that provides a Heroku-like experience.

Getting Started

Deployment

Deployment Methods

  • Git - Deploy via git push
  • Archive - Deploy from tar/zip archives
  • Image - Deploy from Docker images

Builders

Schedulers

Continuous Integration

Configuration

Networking

Proxies

Processes

Advanced Usage

Development

Community

  • Plugins - Community-maintained plugins
  • Clients - API clients and tools

Enterprise

  • Dokku Pro - Commercial features and support

Appendices

Migration Guides

File Formats