Skip to content

Conversation

@reedloden
Copy link
Member

WIP -- missing OSVDB/CVE entry for one advisory

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

need a better description

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I looked at the GitHub Fix Commit and came up with this description https://srcclr.com/security/command-injection/ruby/s-1922

@reedloden
Copy link
Member Author

@bburky / @longboardcat / @alokmenghrajani -- a few questions

Has a CVE/OSVDB ID been requested for square/git-fastclone#5 yet?

Are the reports submitted to HackerOne going to be publicly disclosed? Would be useful for referencing.

I haven't seen any advisories about these issues. Just making sure I'm not missing something.

@bburky
Copy link

bburky commented Jan 18, 2016

The other issue disclosed on hackerone was fixed in square/git-fastclone#2 and square/git-fastclone#3. It was an independent issue, but the same problem that was fixed in git core in CVE-2015-7545.

@longboardcat, @alokmenghrajani I'd be fine with making the HackerOne issues public now that they have been resolved.

@bburky
Copy link

bburky commented Jan 18, 2016

To my knowledge a CVE has not been requested for either of these issues fixed in git-fastclone.

@longboardcat
Copy link

That's okay with me. What do I need to do?

James

On Jan 18, 2016, at 11:31 AM, Blake Burkhart [email protected] wrote:

To my knowledge a CVE has not been requested for either of these issues fixed in git-fastclone.


Reply to this email directly or view it on GitHub.

@reedloden
Copy link
Member Author

@longboardcat -- referring to HackerOne or requesting CVE/OSVDB?

For the former, in the report, select "Publicly disclose" or "Request public disclosure" or whatever the right option is from the drop-down box near the comment box. @bburky will need to do the same on his end so the reports are disclosed.

For the latter, follow the directions outlined at http://guides.rubygems.org/security/#reporting-security-vulnerabilities -- specifically, I would e-mail oss-security@ and cve-assign@ with the information, requesting a CVE. I would then forward that request to OSVDB to get an assignment there as well. I'm happy to help you with this if you would like.

@reedloden
Copy link
Member Author

I submitted http://seclists.org/oss-sec/2016/q1/166 for getting CVEs assigned. Also notified OSVDB.

@longboardcat
Copy link

Thanks! Haven't gotten around to any of this :(

James

On Wed, Jan 20, 2016 at 11:37 AM, Reed Loden [email protected]
wrote:

I submitted http://seclists.org/oss-sec/2016/q1/166 for getting CVEs
assigned. Also notified OSVDB.


Reply to this email directly or view it on GitHub
#232 (comment)
.

@reedloden
Copy link
Member Author

r? @VanessaHenderson

@VanessaHenderson
Copy link
Contributor

Hmmm, the only thing I can see if that git-fastclone hasn't actually pushed any packages to RubyGems since September 2015, where as both of these pulls were merged Dec 2015.
I just downloaded the latest version that was pushed to RubyGems 1.0.14 and it doesn't contain either fix. Someone should nag them to push to RubyGems (and probably with a more accurate version number)

@reedloden
Copy link
Member Author

@VanessaHenderson great catch. I made sure the version was uploaded, but I didn't notice the date. My bad.

@longboardcat what's up with the rubygems mess? Can it be cleaned up to match reality?

@longboardcat
Copy link

The latest version should be correct, there were some mistakes earlier that
were pulled from the gem site. I actually kept the date the same in the
gemspec, but I can push a new version with the new date.

James

On Sat, Jan 23, 2016 at 12:46 PM, Reed Loden [email protected]
wrote:

@VanessaHenderson https://github.com/VanessaHenderson great catch. I
made sure the version was uploaded, but I didn't notice the date. My bad.

@longboardcat https://github.com/longboardcat what's up with the
rubygems mess? Can it be cleaned up to match reality?


Reply to this email directly or view it on GitHub
#232 (comment)
.

@VanessaHenderson
Copy link
Contributor

@longboardcat what about the fix for the OSVDB-133535 the pull indicated adds a log message and an if statement to the code https://github.com/square/git-fastclone/blob/14198fe12443055839b1ba4cc294b04a38ae15f1/lib/git-fastclone.rb#L250 which is not present anymore in master https://github.com/square/git-fastclone/blob/master/lib/git-fastclone.rb#L296

Looking at the code it seems the implementation has changed (where my confusion was caused) square/git-fastclone@93a4634#diff-366e68110b1de1ebeb9dc33605fd697fL249 so perhaps this should be the fix commit listed instead of the PR since those changes were quickly overwritten.

Same with the other OSVDB link and square/git-fastclone@ac3dd98

I feel like these commits should be link because if people are using these commits for patches, they are going to use the not-current fixes for the patches, if that makes sense

Also 1.0.5 is currently yanked from RubyGems so do we want to list that as the "patched from" version if its not actually present currently? Or are there plans to re-push this package in the near future

@bburky
Copy link

bburky commented Jan 25, 2016

Yes, square/git-fastclone@93a4634 replaces square/git-fastclone@14198fe with a better fix using the GIT_ALLOW_PROTOCOL environment variable newly introduced into git itself. If you can link to both square/git-fastclone#2 and square/git-fastclone#3 that would be best.

@longboardcat Can we make https://hackerone.com/reports/104465 and https://hackerone.com/reports/105190 public please? Without the POCs it isn't terribly obvious that both of these vulnerabilities are remotely exploitable with an attacker controlled git repo or git server.

@longboardcat
Copy link

I can't even see them for some reason. I'll ask ping the Square employee
who might help tomorrow.

James

On Sun, Jan 24, 2016 at 5:07 PM, Blake Burkhart [email protected]
wrote:

Yes, square/git-fastclone@93a4634
square/git-fastclone@93a4634 replaces
square/git-fastclone@14198fe
square/git-fastclone@14198fe with a better
fix using the GIT_ALLOW_PROTOCOL environment variable newly introduced into
git itself. If you can link to both square/git-fastclone#2
square/git-fastclone#2 and
square/git-fastclone#3 square/git-fastclone#3
that would be best.

@longboardcat https://github.com/longboardcat Can we make
https://hackerone.com/reports/104465 and
https://hackerone.com/reports/105190 public please? Without the POCs it
isn't terribly obvious that this is remotely exploitable with an attacker
controlled git repo or git server.


Reply to this email directly or view it on GitHub
#232 (comment)
.

@reedloden
Copy link
Member Author

@aviat what's the issue? The vulnerabilities were reported to Square via https://hackerone.com/square-open-source, of which the git-fastclone ruby gem is in scope.

@longboardcat
Copy link

The reports should be public now.

James

On Sun, Jan 24, 2016 at 9:53 PM, Reed Loden [email protected]
wrote:

@aviat https://github.com/aviat what's the issue? The vulnerabilities
were reported to Square via https://hackerone.com/square-open-source, of
which the git-fastclone ruby gem is in scope.


Reply to this email directly or view it on GitHub
#232 (comment)
.

@VanessaHenderson
Copy link
Contributor

I can confirm they are public 👍

@reedloden
Copy link
Member Author

Sorry for the ridiculous delay on these.

HackerOne has assigned CVEs for the two issues here:
CVE-2015-8968 -- https://hackerone.com/reports/104465
CVE-2015-8969 -- https://hackerone.com/reports/105190

I'll update the advisories and get this pushed.

@mveytsman
Copy link
Member

@reedloden it looks like the reports are up: https://hackerone.com/reports/104465 and https://hackerone.com/reports/105190

Do you mind updating the advisories with the CVE's and links to the reports?

sigh I wish github made it easier for me to just push to your PR :(

@mveytsman mveytsman mentioned this pull request Feb 2, 2017
@mveytsman
Copy link
Member

Moved to #277

@mveytsman mveytsman closed this Feb 2, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants