-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Security Fix for Arbitrary Code Execution - huntr.dev #3402
Conversation
Hi @huntr-helper! Thank you for your pull request and welcome to our community. Action RequiredIn order to merge any pull request (code, docs, etc.), we require contributors to sign our Contributor License Agreement, and we don't seem to have one on file for you. ProcessIn order for us to review and merge your suggested changes, please sign at https://code.facebook.com/cla. If you are contributing on behalf of someone else (eg your employer), the individual CLA may not be sufficient and your employer may need to sign the corporate CLA. Once the CLA is signed, our tooling will perform checks and validations. Afterwards, the pull request will be tagged with If you have received this in error or have any questions, please contact us at cla@fb.com. Thanks! |
Thank you for signing our Contributor License Agreement. We can now accept your code for this (and any) Facebook open source project. Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess it's fine? Thanks for the fix.
Not really sure what the risk is. Configs are specified by the devops team. If you had write access to that file, you assumedly can already execute arbitrary code, but I guess one could theoretically chain exploits.
@stephenroller, if you want more security fixes and patches like this in the future, you can let security researchers know that they can win bounties protecting your repository by copying this small code snippet into your README.md:
👇 👇 👇 |
Hi @stephenroller i would like to seek for a help from you Iam attaching the CVE details along with it to make you clear about the impact of this bug |
Okay, I've never done that before. What's the process? |
Hey Thanks a lot i am happy to guide you on this. ImpactThe package was vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. PatchesThe security bug is patched by avoiding unsafe loader it was discovered and patched by Abhiram V, aka @Anon-Artist. WorkaroundsUsers can change the Loader used to SafeLoader otherwise they should update parlai to version above v1.1.0 References |
@stephenroller You can refer this too In Title provide this |
Thanks for the details. Will do it this week and ping on this thread. |
Hi @stephenroller any updates on this. |
Thanks for following up. Our repos are managed by a dedicated team (meaning I'm not an Admin and I can't file the CVE). I've created in an internal ticket to file it. |
Thank you so much @stephenroller , from where i get the updates then |
We'll continue to use this thread for updates. |
Hi @Anon-Artist. The CVE issuing has been bubbled up to Facebook's internal security team. Unfortunately, things were mishandled due to my own failures, but are in the process of being corrected. |
No problem @stephenroller I hope everything will be fine and THANK YOU |
Hi @stephenroller got CVE and published the advisory today Thank you so much for your help on that |
Unfortunately, I don't know about eligibility for a bounty. In the future, please use the official facebook bounty to report security vulnerabilities with any facebook product or github repository, so that the security team can evaluate for eligibility. You can try to file one now and see if you get lucky though. Provide them with the CVE, this github link, and the FB internal ticket number T100033008, and maybe they can help, but I cannot promise. |
Thanks alot @stephenroller could you please guide me its my first time |
Go here and fill it out to the best of your ability: https://www.facebook.com/whitehat/report/, adding the info suggested where possible. |
https://huntr.dev/users/Anon-Artist has fixed the Arbitrary Code Execution vulnerability 🔨. Think you could fix a vulnerability like this?
Get involved at https://huntr.dev/
Q | A
Version Affected | ALL
Bug Fix | YES
Original Pull Request | 418sec#1
Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/pip/ParlAI/1/README.md
User Comments:
📊 Metadata *
ParlAI (pronounced “par-lay”) is a python framework for sharing, training and testing dialogue models, from open-domain chitchat to VQA (Visual Question Answering).
Bounty URL: https://www.huntr.dev/bounties/1-pip-ParlAI
⚙️ Description *
This package was vulnerable to YAML deserialization attack caused by unsafe loading.
💻 Technical Description *
Fixed by avoiding unsafe loader.
🐛 Proof of Concept (PoC) *
Create the following PoC file:
exploit.py
Execute the following commands in another terminal:
xcalc will pop up.
🔥 Proof of Fix (PoF) *
After fix it will not popup a calc.
👍 User Acceptance Testing (UAT)
After fix functionality is unaffected.