Skip to content

fix: the run in run.py#1

Open
orbisai0security wants to merge 1 commit into
mito753:mainfrom
orbisai0security:fix-v-002-url-validation-run-py
Open

fix: the run in run.py#1
orbisai0security wants to merge 1 commit into
mito753:mainfrom
orbisai0security:fix-v-002-url-validation-run-py

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in 2023/idekCTF_2022/Pwn_Sofire=good/distribution/remote/run.py.

Vulnerability

Field Value
ID V-002
Severity CRITICAL
Scanner multi_agent_ai
Rule V-002
File 2023/idekCTF_2022/Pwn_Sofire=good/distribution/remote/run.py:10

Description: The run.py script accepts a URL from user input, downloads the referenced executable without any integrity verification (no checksum, no cryptographic signature, no file type validation), and executes it via ./run.sh. There is no authentication on the service, no allowlist of trusted domains, and no sandboxing of the executed binary. Any party with access to the input prompt can supply a URL to a malicious binary and have it executed on the server with the privileges of the running process.

Changes

  • 2023/idekCTF_2022/Pwn_Sofire=good/distribution/remote/run.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix generated by OrbisAI Security
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant