Clone this wiki locally
GlobaLeaks has received a first source code audit conducted by LeastAuthority. The audit has been done in Q1 2014 and was sponsored by the Open Technology Fund (RFA). The penetration test yielded an overall of 11 issues along with several additional design and implementation suggestions.
The complete report is available at: LeastAuthority-GlobaLeaks-Pentest-Report.pdf
A Blog Post about it is available on Least Authority Website .
All of the security issues identified has been properly fixed, discussing with LeastAuthority the approach being used to solve the problems.
In the following we list all issues with their status and reference to GitHub commits if available.
- Issue A. Plaintext is Written to Disk Before Encryption
- Issue B. SHA256 of Plaintext File is Saved when Encryption is Enabled
- Issue C. Receipts are Too Short
- Issue D. A Receiver Can Suppress File Encryption With No Warning to Others
- Issue F. Tip Files Can Be Downloaded Without Authenticating
- Issue G. Unescaped Characters Put Into Content-Disposition Header
- Issue H. Plaintext File Kept on Server when Whistleblower Does Not Finish Submitting Tip
- Issue I. User Input Written to Logs
- Issue J: Attacker May Be Able To Extract Secrets Through Side-Channel Attacks
- Issue K: Secrets Generated with Non-CSPRNG
The GlobaLeaks team would like to thank LeastAuthority for the audit and Open Technology Fund for sponsoring this event.