I also sent incident report to secur...@apache.org for the checkout action. If it is confirmed that it works this way, this is a really serious issue IMHO.
On Wed, Dec 30, 2020 at 11:24 AM Jarek Potiuk <ja...@potiuk.com> wrote: > > Jarek>Installing and even running commands via PIP does not expose >> GITHUB_TOKEN >> (and this is the real threat). It at most exposes the local build >> >> Running PIP at the ASF Jenkins instance (e.g. https://ci-beam.apache.org/ >> ) >> exposes ASF credentials to a malicious PIP package. >> Does that mean every upgrade of a PIP/NPM package must be analyzed by >> infra? >> > > What credentials are you talking about? > > IMHO, there should not be any ASF credentials available for a Jenkins job > unless it is explicitly given by the workflow author to particular step. > If you are aware of any credentials that are available for such a job - > again, I urge you to reach out to secur...@apache.org as this is (as you > correctly diagnosed) > a huge security threat. By default all CI jobs should have "read only" > credentials that should at most be able to mess with the artifacts of that > particular job and nothing else. > None of the artifacts generated by such a build should be made available > to users. Even if you look at the release policy of ASF all relese > artifacts should be built on the machines > controlled by the release manager. This is a strict requirement of the > release process: > http://www.apache.org/legal/release-policy.html#owned-controlled-hardware > So as long as such an ASF CI job cannot modify the repository and modify > the code in a permanent way, it is far less of a threat. > > The problem with the issue solved by the INFRA is that it could > permanently modify the ASF-owned repository (and thus reach the users!) > without anyone noticing. This is the real issue. > > > That does not scale. >> > > Of course. And it is not needed as long the CI jobs have no write > credentials to the repository unless explicitly given for a specific step - > see above. > > >> >> That is why I say a malicious Maven Plugin can render havoc at ASF >> > > Not as long as the build cannot write to the github repository and modify > code. > > >> Jenkins, and it could make >> silent modifications to the ASF repositories. >> > > Please report that to INFRA if you know how. to do it This is a serious > security threat and IMHO it should be immediately stopped. > > >> >> The same goes for PIP and other dependencies. >> > > Not if they have no credentials to modify the repo (if it's not - please > report it to INFRA) > > >> Vladimir >> > > > -- > +48 660 796 129 > -- +48 660 796 129