Skip to content
Discussion options

You must be logged in to vote

It was an entry point to malware abusing the downloader service to download files locally from protected locations. Two of sparkle's reported security vulnerabilities overall have been partly due to allowing file:// in one place or another. Before 2.7.3, file:// was already blocked for release notes files and update download files (so you couldn't have downloaded an update through file:// before in 2.x). It was unintentional that the feed URL was still allowed to be file:// I suppose.

A local web server over http would serve you better if you can't use a real remote https server. The Sparkle Test App works through setting up a local web server.

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by gao-jx
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants
Converted from issue

This discussion was converted from issue #2787 on October 14, 2025 15:27.