-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security vulnerability: missing SSL hostname validation #25
Comments
Hello @ConradIrwin we have been working with the folks from em-http-request and I think we have reached a good patch for this issue that may be usable in your library. If you decide to implement it, I would love to help you with the testing. You can find more information in the thread at igrigorik/em-http-request#339 Thanks. |
Thanks! That's great news. I'm going to check back in ~2 weeks and see whether there's a solution that has been upstreamed to eventmachine itself (as I don't think em-imap has any users, I'd rather wait and fix this properly than go through a few rounds of patches)
Sent via Superhuman ( https://sprh.mn/?vip=conrad.irwin@gmail.com )
…On Wed, May 27, 2020 at 1:50 AM, Agustin Gianni < ***@***.*** > wrote:
Hello @ ConradIrwin ( https://github.com/ConradIrwin ) we have been working
with the folks from em-http-request and I think we have reached a good
patch for this issue that may be usable in your library. If you decide to
implement it, I would love to help you with the testing.
You can find more information in the thread at igrigorik/ em-http-request#339
( igrigorik/em-http-request#339 )
Thanks.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub (
#25 (comment) ) ,
or unsubscribe (
https://github.com/notifications/unsubscribe-auth/AAAXAQB3MLJFR4GRB33ZW7LRTTH47ANCNFSM4NEOHWZA
).
|
fixes ConradIrwin#25 Based on: lostisland/faraday@63cf47c igrigorik/em-http-request#339 ** missing file
@agustingianni Implemeted a fix based on the information you provided Thank you |
🛠️ A fix has been provided for this issue. Please reference: 418sec#1 🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform. |
GitHub Security Lab (GHSL) Vulnerability Report:
GHSL-2020-095
The GitHub Security Lab team has identified potential security vulnerabilities in em-imap.
We are committed to working with you to help resolve these issues. In this report you will find everything you need to effectively coordinate a resolution of these issues with the GHSL team.
If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at
securitylab@github.com
(please include yourGHSL-2020-095
).If you are NOT the correct point of contact for this report, please let us know!
Summary
Missing hostname validation allows an attacker to perform a man in the middle attack against users of the library.
Product
em-imap
Tested Version
v0.5
Missing SSL/TLS certificate hostname validation
em-imap uses the library eventmachine in an insecure way that allows an attacker to perform a man in the middle attack against users of the library.
Impact
An attacker can assume the identity of a trusted server and introduce malicious data in an otherwise trusted place.
Remediation
Implement hostname validation.
Resources
To trigger the vulnerability, a simple TLS enabled listening daemon is sufficient as described in the following snippets.
Create a sample client with the following contents:
Run the example client to see a connection being performed in the listening daemon initialized in the previous steps.
# Run the example client. $ ruby em-imap-client.rb
References
CWE-297: Improper Validation of Certificate with Host Mismatch
GitHub Security Advisories
We recommend you create a private GitHub Security Advisory for these findings. This also allows you to invite the GHSL team to collaborate and further discuss these findings in private before they are published.
Credit
This issue was discovered and reported by GHSL team member @agustingianni (Agustin Gianni).
Contact
You can contact the GHSL team at
securitylab@github.com
, please include theGHSL-2020-095
in any communication regarding this issue.Disclosure Policy
This report is subject to our coordinated disclosure policy.
The text was updated successfully, but these errors were encountered: