Why would an attacker rely on a deserialization bug when *as a matter of
function* the archetype plugin results in arbitrary code run on your
system?  Its entirely redundant.

Heck, *every maven plugin* is arbitrary code downloaded & executed.

On 17 November 2015 at 16:49, Victor Adrian Sosa Herrera <
victo...@mx1.ibm.com> wrote:

> Perhaps I didn't make myself clear.
>
> Yes, the problem is related on serialization of objects from untrusted
> sources. My understanding is that when you pull/create an archetype,
> there's some sort of serialization of such archetype, please correct me if
> wrong because this is a gray area to me.
>
> What I meant is that it doesn't matter whether you serialize or not using
> the commons-collections library, as long as you have it loaded in the
> classpath.
>
> If that's the case, then m2e is vulnerable. Can someone confirm my
> assumption, please?
>
> Thanks a lot
> Regards
>
> ------------------------------
>   *Victor Adrian Sosa Herrera*
> <http://www.ibm.com/webaccessories/emailsig/i/ibm2.gif> Software Engineer
> - Rational Application Developer  2200 Camino A El Castillo IBM Master
> Innovator  El Salto, 45680 Mexico Software Lab  Mexico C120   Q2   Phone: 
> +52-33-3669-7000
> x3344    Mobile: +52-1-33-1529-6494    e-mail: victo...@mx1.ibm.com
> Twitter <https://twitter.com/sosah_victor>    DeveloperWorks blog
> <https://www.ibm.com/developerworks/community/blogs/victorsh>
> ------------------------------
>
>
>
>
>
> ----- Original message -----
> From: Matthew Piggott <mpigg...@sonatype.com>
> Sent by: m2e-users-boun...@eclipse.org
> To: Maven Integration for Eclipse users mailing list <
> m2e-users@eclipse.org>
> Cc:
> Subject: Re: [m2e-users] Vulnerability problem found in M2E
> Date: Tue, Nov 17, 2015 3:28 PM
>
> Unless you've got the wrong link, the commons vulnerability we've all seen
> is for deserializing objects from untrusted sources.
>
> On 17 November 2015 at 16:24, Victor Adrian Sosa Herrera <
> victo...@mx1.ibm.com> wrote:
>
> Thank you for responding, Matthew.
>
> However, the problem depicted there is that it doesn't matter whether
> you're are serialzing/deserializing objects in runtime, having the JAR in
> the classpath is enough to get this exploitation on the job. Currently, m2e
> seems to be packaging this JAR in org.eclipse.m2e.archetype.common for both
> 1.4 and 1.5.
>
> The good news is that the Apache Commons team shipped yesterday a fix for
> 3.x version. You can grab it from here
> https://commons.apache.org/proper/commons-collections/download_collections.cgi
>
> For 4.x version, they are still working on it AFAIK.
>
> With that being said. Does this sound convincing enough to fix it in m2e?
> Even better, should I open a bugzilla to track this?
>
> Thanks again.
>
> Regards
>
> ------------------------------
>   *Victor Adrian Sosa Herrera*     Software Engineer - Rational
> Application Developer  2200 Camino A El Castillo IBM Master Innovator  El
> Salto, 45680 Mexico Software Lab  Mexico C120   Q2   Phone: +52-33-3669-7000
> x3344    Mobile: +52-1-33-1529-6494    e-mail: victo...@mx1.ibm.com
> Twitter <https://twitter.com/sosah_victor>    DeveloperWorks blog
> <https://www.ibm.com/developerworks/community/blogs/victorsh>
> ------------------------------
>
>
>
>
>
> ----- Original message -----
> From: Matthew Piggott <mpigg...@sonatype.com>
> Sent by: m2e-users-boun...@eclipse.org
> To: Maven Integration for Eclipse users mailing list <
> m2e-users@eclipse.org>
> Cc:
> Subject: Re: [m2e-users] Vulnerability problem found in M2E
> Date: Tue, Nov 17, 2015 3:12 PM
>
> It seems unlikely m2e is affected by it.
>
> Its been a while but I don't recall m2e using class serialization
> internally.  The bundle suggests the archetypes, I don't know if the maven
> archetypes use object serialization but since they can already result in
> arbitrary code being run on your system (via the generated pom) it doesn't
> seem an attack source.
>
>
> On 17 November 2015 at 16:05, Victor Adrian Sosa Herrera <
> victo...@mx1.ibm.com> wrote:
>
> Hello Community.
>
> Throwing again this question to the table. Will this problem be fixed by
> m2e team?
>
> Thanks
>
> Regards
>
> ------------------------------
>   *Victor Adrian Sosa Herrera*     Software Engineer - Rational
> Application Developer  2200 Camino A El Castillo IBM Master Innovator  El
> Salto, 45680 Mexico Software Lab  Mexico C120   Q2   Phone: +52-33-3669-7000
> x3344    Mobile: +52-1-33-1529-6494    e-mail: victo...@mx1.ibm.com
> Twitter <https://twitter.com/sosah_victor>    DeveloperWorks blog
> <https://www.ibm.com/developerworks/community/blogs/victorsh>
> ------------------------------
>
>
>
>
>
> ----- Original message -----
> From: Victor Adrian Sosa Herrera/Mexico/IBM
> To: m2e-users@eclipse.org
> Cc:
> Subject: Vulnerability problem found in M2E
> Date: Mon, Nov 16, 2015 1:39 PM
>
> Hello community.
>
> On the past weeks, a security vulnerability was found in Apache Commons
> Collections library, particularly on versions 3.x and 4.x. You can see
> details here
>
> http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
>
> The fix is on its way and tracked under this JIRA
> https://issues.apache.org/jira/browse/COLLECTIONS-580
>
> Now, I've been digging this a little bit and found that one M2E plugin is
> bundling this commons-collections.jar archive, at least on Eclipse Luna.
> Doing a quick search in the Eclipse installation I found this
>
> org.eclipse.m2e.archetype.common_1.5.0.20140605-2032/commons-collections-3.2.jar
>
> Do you have any plans to patch this plugin with the updated library (once
> available)?
>
> Regards
>
> ------------------------------
>   *Victor Adrian Sosa Herrera*
> <http://www.ibm.com/webaccessories/emailsig/i/ibm2.gif> Software Engineer
> - Rational Application Developer  2200 Camino A El Castillo IBM Master
> Innovator  El Salto, 45680 Mexico Software Lab  Mexico C120   Q2   Phone: 
> +52-33-3669-7000
> x3344    Mobile: +52-1-33-1529-6494    e-mail: victo...@mx1.ibm.com
> Twitter <https://twitter.com/sosah_victor>    DeveloperWorks blog
> <https://www.ibm.com/developerworks/community/blogs/victorsh>
> ------------------------------
>
>
>
>
>
>
> _______________________________________________
> m2e-users mailing list
> m2e-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/m2e-users
>
> _______________________________________________
> m2e-users mailing list
> m2e-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/m2e-users
>
>
>
>
> _______________________________________________
> m2e-users mailing list
> m2e-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/m2e-users
>
> _______________________________________________
> m2e-users mailing list
> m2e-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/m2e-users
>
>
>
>
> _______________________________________________
> m2e-users mailing list
> m2e-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/m2e-users
>
_______________________________________________
m2e-users mailing list
m2e-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/m2e-users

Reply via email to