1 / 4

Packagist Component of Php Package Manager Vulnerable To Compromise

One of the vulnerability compromises found in the Packagist component of the PHP package manager thus making the attack which is possibly made. One of the most important components of Composer i.e. the main package manager for PHP applications was having a vulnerability.

Download Presentation

Packagist Component of Php Package Manager Vulnerable To Compromise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Packagist Component of Php Package Manager Vulnerable To Compromise Hello, friends and cyber Techo geeks welcome to the world of “the hacker newz” in today’s article we are going to discuss one of the vulnerability compromises found in the Packagist component of the PHP package manager thus making the attack which is possibly made. One of the most important components of Composer i.e. the main package manager for PHP applications was having a vulnerability contained that could have attacked the repositories of coding thus being abused as per the finding of the researchers at Sonar Source. Packagist, the vulnerable component, makes the composer enabled for making the determination and download the software dependencies that make the

  2. developer of the software included in their projects. The software packages of approximately 2 billion in the count are served every year by the Composer. The vulnerability is having the potential so much that it might make the exploit for the distribution of the packages which were backdoored and malicious to servers, as per the explanation of it made in a technical blog post by Sonar Source. The threatening of the security was made in 3500,000 dependencies were estimated to be threatened by the security flaw. Fortunately, the vulnerability was resolved by project maintainers only hours after it was reported. INJECTION OF THE ARGUMENT DISCOVERY OF THE BUG BY SONAR SOURCE REPORTING SUPPLY CHAIN ATTACK IN PACKAGES OF PHP PACKAGE MANAGER The new bug is found here which is coming after a year after the discovery was made at the Sonar Source thus making the vulnerability of another supply chain attack reported by them in Packagist. The finding of the previous bug was made in the classes that were having the interaction with version control systems (VCS) such as:- 1. Git 2. Mercurial 3. Subversion for the resolution of the dependencies from the repositories of the code. While the patching of that vulnerability was made by the maintainers of Packagist, it was found by the researchers of the Sonar Source that other parts of the same class were found to have their implementation which was still prone to potential attack. The previous research provided a lot of help to them in making the quick navigation to the most important sections of the code base which were quite juicy but at the same time, the bugs were missed by them several times when making the review of code and thus making the patches which were having the relation to their previous discovery as per the saying of MR. Thomas Chauchefoin is an acting vulnerability researcher at Sonar Source.

  3. For making the information to be displayed about the packages the content is read by the Packagist reads from the “readme. md” file or a file specified by the user-specified in the repository of the code. The separated implementations are contained in the Packagist thus containing the separate implementations for the retrieval of the file data from different VCS systems. The implementation of Each of these implementations could be making a shell command composed that is a shell command having the content included from the file which is supplied by the user. According to Sonar Source, if an attacker could make the insert the commands which are malicious commands in the file information file that would be making the insertion as an argument in the shell command that is found running on the system. And although Packagist makes the usage of the escaping mechanisms for making the malicious code thus being stopped as some of the gaps are left open by it. SUPPLY CHAIN ATTACK MADE IN PACKAGE MANAGER In a proof-of-concept video, it is thus clearly shown by the researchers how the exploitation of the vulnerability could be made here for the running of arbitrary commands on the server. The attacker could make abuse the bug for the modification of the definition of a package and thus making the pointing of it to the destination which was an unintended destination thus making the process of the software development tainted which was still in the process. Thus making the defensive step against the argument injection bugs is seemingly a very unusual comparison made to all the techniques which have been made to the developers in the past decade by them and this is a matter of great thought for Mr. Chauchefoin that is why a lot of the findings are made by them. The encoding of the third-party data can be made thus making the possible escaping along with the tight validation but that will not be enough often.

  4. WAY OF MAKING PRIVATE PROTECTION OF YOURSELF AND YOUR DATA IN PRIVATE PACKAGES The patching of the bug was made by the Packagist after the reporting of the bug was made by Sonar Source to Packagist. If you are going to make use of the default instances of the official Packagist instance or Private Packagist, you are already safe. If you are having a composer which is integrated as a library and thus makes the operation on repositories that can’t be entrusted then the upgradation must be made to one of the patched versions of the library. There are none of the changes made in so many years thus after the current discovery was made it is quite understandable that there are all of these vital projects are behind them with the years of working as said by Mr. Chauchefoin FEATURE ENFORCEMENT IN THE UPDATED VERSION OF THE PRIVATE PACKAGE MANAGER Thus, making the enforcement of features such as the signing of any build artifact i.e., the packages would likely be able to make the introduction of non- trivial changes to the workflows of millions of developers. Meanwhile, the expression of hope given by Mr. Chauchefoin is the making of a greater number of tractions around some of the new standards such as 1. Sig store which might be helpful in the mitigation of risks of supply chain attacks. Ideally, the manager of the package should only be placed in tubes having their presence between the maintainers and package users, and none of the ways to do the tampering should be there with what flows inside. The signing of everything is the key, and it is made much more affordable by the sig store as said by him. Thanks for reading. Hope you must have enjoyed reading the article. Follow The Hacker news on our social platforms “Twitter (thehackernewz) and LinkedIn (The Hacker Newz) “for reading more exclusive content posted daily. Source Link: https://thehackernewz.com/packagist-component-of-php-package-manager- vulnerable-to-compromise/

More Related