-
-
Notifications
You must be signed in to change notification settings - Fork 322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ghc 9.8 support / process vulnerability on Windows ? #2149
Comments
FWIW, ghc-9.8.2 ships with |
@blackgnezdo indeed. This is keeping hledger 1.33 out of stackage at the moment. I made 1.33 require process >=1.6.19.0 because it fixes a command injection vulnerability on Windows (HSEC-2024-0003, CERT CC VU#123335). But I seem to be ahead of the ecosystem here, and the advisory says:
So it's not obvious how this could cause a vulnerability in the hledger tools, and perhaps it's ok to relax our process lower bound. |
hledger-web is also blocked by depending on base64 <1, and will need a minor release. |
Well on the other hand..
So, is it in fact possible to do something bad by having a |
https://github.com/haskell/security-advisories/blob/main/advisories/hackage/process/HSEC-2024-0003.md#demonstration seems to show how you could cause hledger to execute commands other than hledger addons, eg a command something like |
I found a Windows VM. Yes, you can reproduce this issue very easily with hledger-1.33 in Powershell like so -
But a command requiring admin privilege remains unrunnable:
So I am once again thinking this vulnerability is harmless as far as the hledger tools are concerned. |
1.33.1 released with relaxed process bound. |
And finally: hledger is back in stackage nightly as of nightly-2024-05-10. |
I've updated stack9.8.yaml to make most packages build with GHC 9.8 and stackage nightly. Still to do:
The text was updated successfully, but these errors were encountered: