m2e doesn't deserialize anything from remote connections (doesn't even rely
on commons-collections for deserializing it's local state). The archetype
plugin simply downloads xml and jars, I'm not aware it uses the
deserialization mechanism either. I don't believe, unless proven otherwise,
that m2e is affected by that particular vulnerability.

With that said, I'm fine updating to a non-vulnerable commons-collections
version (3.2.2). Please open a bug in [1].
And if you want to provide a patch, have at it [1][2]:-)

Fred

[1] https://bugs.eclipse.org/bugs/enter_bug.cgi?product=m2e
[2]
https://www.eclipse.org/m2e/documentation/m2e-development-environment.html#submitting-patches
[3]
http://git.eclipse.org/c/m2e/m2e-core.git/tree/m2e-maven-runtime/org.eclipse.m2e.archetype.common/pom.xml#n28

On Tue, Nov 17, 2015 at 5:07 PM, Matthew Piggott <mpigg...@sonatype.com>
wrote:

> Why would an attacker rely on a deserialization bug when *as a matter of
> function* the archetype plugin results in arbitrary code run on your
> system?  Its entirely redundant.
>
> Heck, *every maven plugin* is arbitrary code downloaded & executed.
>
> On 17 November 2015 at 16:49, Victor Adrian Sosa Herrera <
> victo...@mx1.ibm.com> wrote:
>
>> Perhaps I didn't make myself clear.
>>
>> Yes, the problem is related on serialization of objects from untrusted
>> sources. My understanding is that when you pull/create an archetype,
>> there's some sort of serialization of such archetype, please correct me if
>> wrong because this is a gray area to me.
>>
>> What I meant is that it doesn't matter whether you serialize or not using
>> the commons-collections library, as long as you have it loaded in the
>> classpath.
>>
>> If that's the case, then m2e is vulnerable. Can someone confirm my
>> assumption, please?
>>
>> Thanks a lot
>> Regards
>>
>> ------------------------------
>>   *Victor Adrian Sosa Herrera*
>> <http://www.ibm.com/webaccessories/emailsig/i/ibm2.gif> Software
>> Engineer - Rational Application Developer  2200 Camino A El Castillo IBM
>> Master Innovator  El Salto, 45680 Mexico Software Lab  Mexico C120   Q2
>> Phone: +52-33-3669-7000 x3344    Mobile: +52-1-33-1529-6494    e-mail:
>> victo...@mx1.ibm.com    Twitter <https://twitter.com/sosah_victor>    
>> DeveloperWorks
>> blog <https://www.ibm.com/developerworks/community/blogs/victorsh>
>> ------------------------------
>>
>>
>>
>>
>>
>> ----- Original message -----
>> From: Matthew Piggott <mpigg...@sonatype.com>
>> Sent by: m2e-users-boun...@eclipse.org
>> To: Maven Integration for Eclipse users mailing list <
>> m2e-users@eclipse.org>
>> Cc:
>> Subject: Re: [m2e-users] Vulnerability problem found in M2E
>> Date: Tue, Nov 17, 2015 3:28 PM
>>
>> Unless you've got the wrong link, the commons vulnerability we've all
>> seen is for deserializing objects from untrusted sources.
>>
>> On 17 November 2015 at 16:24, Victor Adrian Sosa Herrera <
>> victo...@mx1.ibm.com> wrote:
>>
>> Thank you for responding, Matthew.
>>
>> However, the problem depicted there is that it doesn't matter whether
>> you're are serialzing/deserializing objects in runtime, having the JAR in
>> the classpath is enough to get this exploitation on the job. Currently, m2e
>> seems to be packaging this JAR in org.eclipse.m2e.archetype.common for both
>> 1.4 and 1.5.
>>
>> The good news is that the Apache Commons team shipped yesterday a fix for
>> 3.x version. You can grab it from here
>> https://commons.apache.org/proper/commons-collections/download_collections.cgi
>>
>> For 4.x version, they are still working on it AFAIK.
>>
>> With that being said. Does this sound convincing enough to fix it in m2e?
>> Even better, should I open a bugzilla to track this?
>>
>> Thanks again.
>>
>> Regards
>>
>> ------------------------------
>>   *Victor Adrian Sosa Herrera*     Software Engineer - Rational
>> Application Developer  2200 Camino A El Castillo IBM Master Innovator  El
>> Salto, 45680 Mexico Software Lab  Mexico C120   Q2   Phone: +52-33-3669-7000
>> x3344    Mobile: +52-1-33-1529-6494    e-mail: victo...@mx1.ibm.com
>> Twitter <https://twitter.com/sosah_victor>    DeveloperWorks blog
>> <https://www.ibm.com/developerworks/community/blogs/victorsh>
>> ------------------------------
>>
>>
>>
>>
>>
>> ----- Original message -----
>> From: Matthew Piggott <mpigg...@sonatype.com>
>> Sent by: m2e-users-boun...@eclipse.org
>> To: Maven Integration for Eclipse users mailing list <
>> m2e-users@eclipse.org>
>> Cc:
>> Subject: Re: [m2e-users] Vulnerability problem found in M2E
>> Date: Tue, Nov 17, 2015 3:12 PM
>>
>> It seems unlikely m2e is affected by it.
>>
>> Its been a while but I don't recall m2e using class serialization
>> internally.  The bundle suggests the archetypes, I don't know if the maven
>> archetypes use object serialization but since they can already result in
>> arbitrary code being run on your system (via the generated pom) it doesn't
>> seem an attack source.
>>
>>
>> On 17 November 2015 at 16:05, Victor Adrian Sosa Herrera <
>> victo...@mx1.ibm.com> wrote:
>>
>> Hello Community.
>>
>> Throwing again this question to the table. Will this problem be fixed by
>> m2e team?
>>
>> Thanks
>>
>> Regards
>>
>> ------------------------------
>>   *Victor Adrian Sosa Herrera*     Software Engineer - Rational
>> Application Developer  2200 Camino A El Castillo IBM Master Innovator  El
>> Salto, 45680 Mexico Software Lab  Mexico C120   Q2   Phone: +52-33-3669-7000
>> x3344    Mobile: +52-1-33-1529-6494    e-mail: victo...@mx1.ibm.com
>> Twitter <https://twitter.com/sosah_victor>    DeveloperWorks blog
>> <https://www.ibm.com/developerworks/community/blogs/victorsh>
>> ------------------------------
>>
>>
>>
>>
>>
>> ----- Original message -----
>> From: Victor Adrian Sosa Herrera/Mexico/IBM
>> To: m2e-users@eclipse.org
>> Cc:
>> Subject: Vulnerability problem found in M2E
>> Date: Mon, Nov 16, 2015 1:39 PM
>>
>> Hello community.
>>
>> On the past weeks, a security vulnerability was found in Apache Commons
>> Collections library, particularly on versions 3.x and 4.x. You can see
>> details here
>>
>> http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
>>
>> The fix is on its way and tracked under this JIRA
>> https://issues.apache.org/jira/browse/COLLECTIONS-580
>>
>> Now, I've been digging this a little bit and found that one M2E plugin is
>> bundling this commons-collections.jar archive, at least on Eclipse Luna.
>> Doing a quick search in the Eclipse installation I found this
>>
>> org.eclipse.m2e.archetype.common_1.5.0.20140605-2032/commons-collections-3.2.jar
>>
>> Do you have any plans to patch this plugin with the updated library (once
>> available)?
>>
>> Regards
>>
>> ------------------------------
>>   *Victor Adrian Sosa Herrera*
>> <http://www.ibm.com/webaccessories/emailsig/i/ibm2.gif> Software
>> Engineer - Rational Application Developer  2200 Camino A El Castillo IBM
>> Master Innovator  El Salto, 45680 Mexico Software Lab  Mexico C120   Q2
>> Phone: +52-33-3669-7000 x3344    Mobile: +52-1-33-1529-6494    e-mail:
>> victo...@mx1.ibm.com    Twitter <https://twitter.com/sosah_victor>    
>> DeveloperWorks
>> blog <https://www.ibm.com/developerworks/community/blogs/victorsh>
>> ------------------------------
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> m2e-users mailing list
>> m2e-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/m2e-users
>>
>> _______________________________________________
>> m2e-users mailing list
>> m2e-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/m2e-users
>>
>>
>>
>>
>> _______________________________________________
>> m2e-users mailing list
>> m2e-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/m2e-users
>>
>> _______________________________________________
>> m2e-users mailing list
>> m2e-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/m2e-users
>>
>>
>>
>>
>> _______________________________________________
>> m2e-users mailing list
>> m2e-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/m2e-users
>>
>
>
> _______________________________________________
> m2e-users mailing list
> m2e-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/m2e-users
>



-- 
"Have you tried turning it off and on again" - The IT Crowd
And if that fails, then http://goo.gl/tnBgH5
_______________________________________________
m2e-users mailing list
m2e-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/m2e-users

Reply via email to