-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Explicitly document that loading of files is insecure #50
Comments
Without risking me compromising your machine:
Then start a new julia session:
|
This was referenced Jul 16, 2019
aviks
added a commit
to aviks/BSON.jl
that referenced
this issue
Aug 14, 2019
ararslan
pushed a commit
that referenced
this issue
Oct 1, 2019
Just wondering: is this actually due to the BSON loading process, or due to the I figured the BSON loading could probably be made secure (though obviously that's pretty moot for most users if any practical usage of that data is unsafe). |
it is actually the loading. Note the |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
We had some discussion on slack that loading of adversarial BSON files is insecure by design and intention. Hence, this is not really a security issue, and requires no responsible disclosure. However, I think we could document this better, and maybe keep this issue open as catch-all discussion thread for security aspects of
BSON.jl
.On slack, @oxinabox asked for a PoC. Find a PoC attached (expected behavior:
parse
should work without issue and allow you to inspect the file;load
runscat /etc/passwd
before erroring out; you might consider using a VM for that).Code execution is obtained by triggering a
convert
of aSubArray
, which in turn triggers agetindex
on aBase.Broadcast.Broadcasted(run, ([`cat /etc/passwd`],))
.poc.bson.zip
The text was updated successfully, but these errors were encountered: