-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SECURITY] 0.9.* Releases were built/executed/released in the context of insecure/untrusted code #953
Comments
Well, these versions couldn't be entirely removed. However it's planned to remove these outdated versions anyway from project generator and apidoc website. |
Also these versions are not published to maven central but only to bintray. So it could be possible to overwrite pom files that is usually bad idea but could be possible. Not sure if we have to try it. |
It's also important to note that any developers using this repository during this development period could have their computers compromised and may still be compromised if they haven't reinstalled their OS. I think it's probably sufficient to file for a CVE number (I can do this unless Jetbrains is a CNA and can get this done faster) and make a concerted effort to not ever execute those old tags on any developers machines. I've also updated the issue to mention that versions |
Sorry, now I don't get your point: no released pom file have this usafe http urls inside, current master branch don't have as well. We have http url in out git repository and these commit can't be removed. Why this issue is particular to ktor and what steps we can do to prevent user from using insecure connections? |
The only solution is to discard the whole bintray repo and make a new one with different name/url. Unfortunately this repo doesn't belong to ktor but to the big kotlin. Not sure if we can do this that easily. |
This isn't a user issue, this is a developer issue and there was the potential for the build server that was used to build the Ktor releases to have been maliciously MITMed. The fallout is if someone was attempting to maliciously compromise Ktor via a MITM, they've already done it. |
Related: ktorio/ktor-samples#40 |
Please check the following ticket on YouTrack for follow-ups to this issue. GitHub issues will be closed in the coming weeks. |
CWE-829: Inclusion of Functionality from Untrusted Control Sphere
All of these build files include resolving these dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JAR files were compromised, any developers using these dependencies now could continue to be infected.
This vulnerability has a CVSS v3.0 Base Score of 8.1/10
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
This isn't just theoretical; POC code exists already to maliciously compromise jar file inflight.
See:
The text was updated successfully, but these errors were encountered: