Security releases for Plug

159 views
Skip to first unread message

José Valim

unread,
Feb 28, 2017, 1:23:58 PM2/28/17
to elixir-l...@googlegroups.com
Hello everyone,

Two vulnerabilities have been disclosed to Plug. Applications that provide file uploading functionality to a local filesystem are advised to upgrade immediately. Upgrade is also recommended for any other application that uses Plug, to ensure they follow the latest and best security practices.

We have released new Plug versions v1.0.4, v1.1.7, v1.2.3 and v1.3.2. If you can't upgrade immediately, we also include fixes you can directly add to your applications.

## Null Byte Injection in Plug.Static

Plug.Static is used for serving static assets, and is vulnerable to null byte injection. If file upload functionality is provided, this can allow users to bypass filetype restrictions.

We recommend all applications that provide file upload functionality and serve those uploaded files locally with Plug.Static to upgrade immediately or include the fix below. If uploaded files are rather stored and served from S3 or any other cloud storage, you are not affected.

  * Versions affected: Plug v1.3.1, v1.3.0, v1.2.2, v1.2.1, v1.2.0, v1.1.6, v1.1.5, v1.1.4, v1.1.3, v1.1.2, v1.1.1, v1.1.0, v1.0.3, v1.0.2, v1.0.1, v1.0.0
  * Versions fixed: Plug v1.3.2+, v1.2.3+, v1.1.7+, v1.0.4+
  * Author: Griffin Byatt <griffin.byatt[at]nccgroup[dot]trust>
  * Thanks to: Chip Durland, Raviv Cohen and Matthew Diaz

### Temporary fix

Identify where `plug Plug.Static` is invoked in your application (in a Phoenix application this means the MyApp.Endpoint) and add the following lines **before** `plug Plug.Static`:

    plug :safe_plug_static

    defp safe_plug_static(conn, _) do
      Enum.any?(conn.path_info, &URI.decode(&1) =~ <<0>>) && raise "invalid path"
      conn
    end

## Arbitrary Code Execution in Cookie Serialization

The default serialization used by Plug session may result in code execution in certain situations. Keep in mind, however, the session cookie is signed and this attack can only be exploited if the attacker has access to your secret key as well as your signing/encryption salts. We recommend users to change their secret key base and salts if they suspect they have been leaked, regardless of this vulnerability.

  * Versions affected: Plug v1.3.1, v1.3.0, v1.2.2, v1.2.1, v1.2.0, v1.1.6, v1.1.5, v1.1.4, v1.1.3, v1.1.2, v1.1.1, v1.1.0, v1.0.3, v1.0.2, v1.0.1, v1.0.0
  * Versions fixed: Plug v1.3.2+, v1.2.3+, v1.1.7+, v1.0.4+
  * Author: Griffin Byatt <griffin.byatt[at]nccgroup[dot]trust>
  * Thanks to: Matthew Diaz

### Temporary fix

If you can't upgrade immediately, you can temporarily protect yourself by using a custom serializer `Plug.Session` serializer.

    plug Plug.Session, serializer: MyApp.SafeSerializer

Where `MyApp.SafeSerializer` is defined as:

    defmodule SafeSerializer do
      def encode(term) do
        {:ok, :erlang.term_to_binary(term)}
      end

      def decode(binary) do
        try do
          {:ok, safe_terms(:erlang.binary_to_term(binary))}
        rescue
          _ -> :error
        end
      end

      defp safe_terms(list) when is_list(list) do
        for item <- list, do: safe_terms(item)
        list
      end
      defp safe_terms(tuple) when is_tuple(tuple) do
        safe_tuple(tuple, tuple_size(tuple))
        tuple
      end
      defp safe_terms(map) when is_map(map) do
        for {key, value} <- map do
          safe_terms(key)
          safe_terms(value)
        end
        map
      end
      defp safe_terms(other) when is_atom(other) or is_number(other) or is_binary(other) or
                                  is_pid(other) or is_reference(other) do
        other
      end
      defp safe_terms(other) do
        raise ArgumentError, "cannot deserialize #{inspect other}, the term is not safe for deserialization"
      end

      defp safe_tuple(tuple, 0), do: :ok
      defp safe_tuple(tuple, n), do
        safe_terms(:erlang.element(n, tuple))
        safe_tuple(tuple, n - 1)
      end
    end

## Final remarks

We want to thank the NCC Group for reporting those vulnerabilities.

NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape. Our Security Consulting services leverage our extensive knowledge of current security vulnerabilities, penetration testing techniques and software development best practices to enable organizations to secure their applications against ever-present threats. At NCC Group we can boast unrivaled talent and recognized world-class security expertise. Bringing together best in class security consultancies iSEC Partners, Intrepidus Group, Matasano, NCC Group and NGS we have created one of the largest, most respected security consultancies in the world.



José Valim
Skype: jv.ptec
Founder and Director of R&D
Reply all
Reply to author
Forward
0 new messages