Skip to content

Dependencies pulled via hard-coded HTTP links

Low
fntlnz published GHSA-cxrc-f2j2-3rj3 Apr 19, 2021

Package

Falco

Affected versions

<0.18.0

Patched versions

0.18.0

Description

Impact

What kind of vulnerability is it? Who is impacted?

This vulnerability might impact users or automated system that are building Falco from source.
Basically, it was noticed that some dependencies in the CMake-files were download via hard-coded HTTP links. Since the dowload happened via a clear-text connection, an attacker with Man-in-the-Middle capabilities could spoof the connection to dowload malicius content instead of the legitimate dependencies.

Patches

Has the problem been patched? What versions should users upgrade to?

The problem has been addressed by #774 on Aug 17, 2019.
The patch is part of the 0.18.0 release.

Users who had built Falco from the source before the fix should build it again using a version of the source code either greater than or equal to 0.18.0 or that includes the above-mentioned patch.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Users can manually patch CMake-files ensuring all dependencies are pulled via HTTPS links.

References

Are there any links users can visit to find out more?

This vulnerability was initially reported in this security audit and it's identified by the ID FAL-01-004.

For more information

If you have any questions or comments about this advisory:

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs

Credits