Vulnerabilities in dependencies used in projects
The case of 4Chan
- never updated any dependencies since 2009
- one dependency used was publicly-known to have multiple critical vuln
- Ghostscript - https://security.snyk.io/vuln?search=ghostscript
- Local File Inclusion - process pdf files but never checked if the pdf is actually pdf
- Remote code execution - after injecting. can run scripts on the server
- The modern wake up call - this event reminded everyone to stay up to date with dependencies updates
Dependencies we’re using:
- mPDF - fixed
- vuln for versions lower than 7.1.8
- deserialization of untrusted data - similar with how 4chan got hacked
- aws/aws-sdk-php - fixed
- path traversal
- vuln for versions lower than 3.288.1
- can go back and open directories that are not public
- arbitrary code execution
- vuln for versions lower than 3.2.1
Best practices:
- stay up to date with the tech world
- join forums like reddit and stackoverflow
- check websites that publish security reports
- snyk security - https://security.snyk.io/vuln/
- regularly audit dependencies
- update if needs to
Comments
Post a Comment