Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SECURITY] 0.9.* Releases were built/executed/released in the context of insecure/untrusted code #953

Closed
JLLeitschuh opened this issue Feb 14, 2019 · 8 comments
Assignees

Comments

@JLLeitschuh
Copy link
Contributor

JLLeitschuh commented Feb 14, 2019

CWE-829: Inclusion of Functionality from Untrusted Control Sphere

All of these build files include resolving these dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JAR files were compromised, any developers using these dependencies now could continue to be infected.

This vulnerability has a CVSS v3.0 Base Score of 8.1/10
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

This isn't just theoretical; POC code exists already to maliciously compromise jar file inflight.

See:

@cy6erGn0m
Copy link
Contributor

Well, these versions couldn't be entirely removed. However it's planned to remove these outdated versions anyway from project generator and apidoc website.

@cy6erGn0m
Copy link
Contributor

Also these versions are not published to maven central but only to bintray. So it could be possible to overwrite pom files that is usually bad idea but could be possible. Not sure if we have to try it.

@JLLeitschuh
Copy link
Contributor Author

JLLeitschuh commented Feb 15, 2019

It's also important to note that any developers using this repository during this development period could have their computers compromised and may still be compromised if they haven't reinstalled their OS.

I think it's probably sufficient to file for a CVE number (I can do this unless Jetbrains is a CNA and can get this done faster) and make a concerted effort to not ever execute those old tags on any developers machines.

I've also updated the issue to mention that versions 1.0.0 and 1.0.1 are also impacted by this.

@cy6erGn0m
Copy link
Contributor

Sorry, now I don't get your point: no released pom file have this usafe http urls inside, current master branch don't have as well. We have http url in out git repository and these commit can't be removed. Why this issue is particular to ktor and what steps we can do to prevent user from using insecure connections?

@cy6erGn0m
Copy link
Contributor

cy6erGn0m commented Feb 15, 2019

The only solution is to discard the whole bintray repo and make a new one with different name/url. Unfortunately this repo doesn't belong to ktor but to the big kotlin. Not sure if we can do this that easily.

@JLLeitschuh
Copy link
Contributor Author

Sorry, now I don't get your point: no released pom file have this usafe http urls inside, current master branch don't have as well. We have http url in out git repository and these commit can't be removed. Why this issue is particular to ktor and what steps we can do to prevent user from using insecure connections?

This isn't a user issue, this is a developer issue and there was the potential for the build server that was used to build the Ktor releases to have been maliciously MITMed.

The fallout is if someone was attempting to maliciously compromise Ktor via a MITM, they've already done it.

@JLLeitschuh
Copy link
Contributor Author

Related: ktorio/ktor-samples#40

cy6erGn0m pushed a commit to ktorio/ktor-samples that referenced this issue Feb 21, 2019
cy6erGn0m pushed a commit to ktorio/ktor-init-tools that referenced this issue Feb 21, 2019
cy6erGn0m pushed a commit to Kotlin/kotlinx.html that referenced this issue Feb 26, 2019
@oleg-larshin
Copy link

Please check the following ticket on YouTrack for follow-ups to this issue. GitHub issues will be closed in the coming weeks.

@hhariri hhariri closed this as completed Mar 29, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants