On Mon, Jan 7, 2019 at 10:39 AM Alex Harui <aha...@adobe.com.invalid> wrote:

> Hi Greg,
>
> Thanks for the history.  I agree with the general problem, however, for
> Royale, I think the problem is constrained, but I could be wrong.  I don't
> think there are exploits from things like missing semicolons and other code
> exploits that can be executed against pom.xml files, so the Royale
> reviewers are first looking to see if bot changed any other files.


It's definitely not safe to assume that a change will not introduce
something malicious purely based on the files it touches.

Maybe Maven experts can tell us what kinds of exploit could be hacked into
> a pom.xml.
>

Given the array of plugins available, just about anything is possible:

    ...
    <plugin>
        <artifactId>exec-maven-plugin</artifactId>
        <groupId>org.codehaus.mojo</groupId>
        <version>1.6.0</version>
        <executions>
            <execution>
                <phase>generate-sources</phase>
                <goals>
                    <goal>exec</goal>
                </goals>
                <configuration>
                    <executable>echo</executable>
                    <commandlineArgs>something nefarious</commandlineArgs>
                </configuration>
            </execution>
        </executions>
    </plugin>
    ...

- Mike

Reply via email to