Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2015-2171 #837

Closed
paragonie-scott opened this issue Nov 4, 2016 · 6 comments
Closed

CVE-2015-2171 #837

paragonie-scott opened this issue Nov 4, 2016 · 6 comments

Comments

@paragonie-scott
Copy link

Why are you publishing code that had a public PHP object injection (read: possible remote code execution) vulnerability that was fixed over a year ago?

More importantly: Why are you deploying this vulnerable code to systems used by US government agencies?

@wilpig
Copy link
Collaborator

wilpig commented Nov 4, 2016

Before you go making bold claims like this please research them.

slimphp/Slim#1034

While this is an issue it does not affect us as we aren't using session cookies with slim

@wilpig wilpig closed this as completed Nov 4, 2016
@paragonie-scott
Copy link
Author

paragonie-scott commented Nov 4, 2016

Pay no attention to the man behind the curtain. Everything is fine. this-is-fine.jpg

https://github.com/samilliken/openDCIM/search?utf8=%E2%9C%93&q=unserialize

This just shows a more serious problem: You're not keeping your dependencies up to date. This is more serious problem than it first appears.

But by all means, continue to bury your head in the sand. I only opened an issue here because HN users tried to guilt me into it. I'm not a user of this software, so any security snafus made here aren't really my business.

@wilpig
Copy link
Collaborator

wilpig commented Nov 4, 2016

Please feel free to open an issue when you find an actual problem. Playing peekaboo for a specific commands with no understanding of the code itself would be like me pointing at Congress and saying "misappropriation". While it might be happening you can't fix it without a specific information set to work from. All you've done is make an accusation and distract me from whatever I was thinking about.

@paragonie-scott
Copy link
Author

I just outlined the actual problem:

  1. You aren't updating your dependencies in a timely manner.
  2. Your dependencies will have vulnerabilities discovered in them.
  3. From the linked article: 99.9% of vulnerabilities exploited in 2015 happened over one year after the vulnerability was public.

Your process (or perhaps the lack thereof) will fail your users. That is an actual problem, and the one you may want to actually spend time thinking about.

But I'm not here to help, I'm here to fulfill a moral obligation so no one can say I didn't try. Consider my effort concluded.

(Also, if you can in any way help it, just stop using unserialize(). Too many memory corruption vulnerabilities result from it.)

@wilpig
Copy link
Collaborator

wilpig commented Nov 4, 2016 via email

@paragonie-scott
Copy link
Author

You want to help them submit code updates and correct the issues.

This is really something that should have been done all along. Most PHP projects have moved to Composer (and https://github.com/Roave/SecurityAdvisories for that matter) to make this easier.

I hope, should OpenDCIM's inability to keep dependencies up to date even when security vulnerabilities are fixed upstream lead to a government agency getting owned up, no one on your team gets held liable in any capacity.

And with that, I'm out.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants