Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review of pegasus-integrity-check #7

Open
von opened this issue Jul 24, 2017 · 3 comments
Open

Review of pegasus-integrity-check #7

von opened this issue Jul 24, 2017 · 3 comments
Assignees
Labels

Comments

@von
Copy link
Contributor

von commented Jul 24, 2017

@von von added the IU label Jul 24, 2017
@von von self-assigned this Jul 24, 2017
@von
Copy link
Contributor Author

von commented Sep 25, 2017

Steve and Omkar to look at this.

@obisec
Copy link
Collaborator

obisec commented Oct 30, 2017

Couldn't successfully run pegasus-integrity through SWAMP, kept hitting build errors (will give it another try). Thus manually scanned the python pegasus-integrity code through popular python security code scanners like Bandit, PyLint and Flake8. Pylint and Flake didn't give out any specific security threats other than styling errors. One specific high level threat identified by Bandit was about "subprocess call with shell=True identified".

Issue: [B602:subprocess_popen_with_shell_equals_true] subprocess call with shell=True identified, security issue.
Severity: High Confidence: High
Location: pegasus-integrity:231

This vulnerability would allow arbitrary code execution, as well as privilege escalation if the input is not validated properly.

@rheiland
Copy link
Member

I'm guessing the problem w/ SWAMP was the missing ".py" suffix. Rf. #8 where I discussed this. Also rf. the "Python2/3" thread on our swip-l mailing list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants