I don't feel too strongly about this, but maybe the better approach would to get apache devs release fixed archetype version first, then integrate that into m2e?
-- Regards, Igor On Tue, Nov 17, 2015, at 06:03 PM, Fred Bricon wrote: > m2e doesn't deserialize anything from remote connections (doesn't even rely > on commons-collections for deserializing it's local state). The archetype > plugin simply downloads xml and jars, I'm not aware it uses the > deserialization mechanism either. I don't believe, unless proven otherwise, > that m2e is affected by that particular vulnerability. > > With that said, I'm fine updating to a non-vulnerable commons-collections > version (3.2.2). Please open a bug in [1]. > And if you want to provide a patch, have at it [1][2]:-) > > Fred > > [1] https://bugs.eclipse.org/bugs/enter_bug.cgi?product=m2e > [2] > https://www.eclipse.org/m2e/documentation/m2e-development-environment.html#submitting-patches > [3] > http://git.eclipse.org/c/m2e/m2e-core.git/tree/m2e-maven-runtime/org.eclipse.m2e.archetype.common/pom.xml#n28 > > On Tue, Nov 17, 2015 at 5:07 PM, Matthew Piggott <mpigg...@sonatype.com> > wrote: >> Why would an attacker rely on a deserialization bug when *as a matter of >> function* the archetype plugin results in arbitrary code run on your system? >> Its entirely redundant. >> >> Heck, *every maven plugin* is arbitrary code downloaded & executed. >> >> On 17 November 2015 at 16:49, Victor Adrian Sosa Herrera >> <victo...@mx1.ibm.com> wrote: >>> Perhaps I didn't make myself clear. >>> >>> Yes, the problem is related on serialization of objects from untrusted >>> sources. My understanding is that when you pull/create an archetype, >>> there's some sort of serialization of such archetype, please correct me if >>> wrong because this is a gray area to me. >>> >>> What I meant is that it doesn't matter whether you serialize or not using >>> the commons-collections library, as long as you have it loaded in the >>> classpath. >>> >>> If that's the case, then m2e is vulnerable. Can someone confirm my >>> assumption, please? >>> >>> Thanks a lot >>> Regards >>> >>> >>> *Victor Adrian Sosa Herrera* >>> >>> >>> Software Engineer - Rational Application Developer >>> 2200 Camino A El Castillo >>> IBM Master Innovator >>> El Salto, 45680 >>> Mexico Software Lab >>> Mexico >>> C120 >>> >>> Q2 >>> >>> Phone: >>> +52-33-3669-7000 x3344[1] >>> >>> Mobile: >>> +52-1-33-1529-6494[2] >>> >>> e-mail: >>> victo...@mx1.ibm.com >>> >>> Twitter[3] >>> >>> DeveloperWorks blog[4] >>> >>> >>> >>> >>> >>> >>> >>> >>>> ----- Original message ----- >>>> From: Matthew Piggott <mpigg...@sonatype.com> >>>> Sent by: m2e-users-boun...@eclipse.org >>>> To: Maven Integration for Eclipse users mailing list >>>> <m2e-users@eclipse.org> >>>> Cc: >>>> Subject: Re: [m2e-users] Vulnerability problem found in M2E >>>> Date: Tue, Nov 17, 2015 3:28 PM >>>> Unless you've got the wrong link, the commons vulnerability we've all seen >>>> is for deserializing objects from untrusted sources. >>>> >>>> On 17 November 2015 at 16:24, Victor Adrian Sosa Herrera >>>> <victo...@mx1.ibm.com> wrote: >>>> >>>>> >>>>> Thank you for responding, Matthew. >>>>> >>>>> However, the problem depicted there is that it doesn't matter whether >>>>> you're are serialzing/deserializing objects in runtime, having the JAR in >>>>> the classpath is enough to get this exploitation on the job. Currently, >>>>> m2e seems to be packaging this JAR in org.eclipse.m2e.archetype.common >>>>> for both 1.4 and 1.5. >>>>> >>>>> The good news is that the Apache Commons team shipped yesterday a fix for >>>>> 3.x version. You can grab it from here >>>>> https://commons.apache.org/proper/commons-collections/download_collections.cgi >>>>> >>>>> For 4.x version, they are still working on it AFAIK. >>>>> >>>>> With that being said. Does this sound convincing enough to fix it in m2e? >>>>> Even better, should I open a bugzilla to track this? >>>>> >>>>> Thanks again. >>>>> >>>>> >>>>> Regards >>>>> >>>>> >>>>> >>>>> *Victor Adrian Sosa Herrera* >>>>> >>>>> >>>>> Software Engineer - Rational Application Developer >>>>> 2200 Camino A El Castillo >>>>> IBM Master Innovator >>>>> El Salto, 45680 >>>>> Mexico Software Lab >>>>> Mexico >>>>> C120 >>>>> >>>>> Q2 >>>>> >>>>> Phone: >>>>> +52-33-3669-7000 x3344[5] >>>>> >>>>> Mobile: >>>>> +52-1-33-1529-6494[6] >>>>> >>>>> e-mail: >>>>> victo...@mx1.ibm.com >>>>> >>>>> Twitter[7] >>>>> >>>>> DeveloperWorks blog[8] >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>>> ----- Original message ----- >>>>>> From: Matthew Piggott <mpigg...@sonatype.com> >>>>>> Sent by: m2e-users-boun...@eclipse.org >>>>>> To: Maven Integration for Eclipse users mailing list >>>>>> <m2e-users@eclipse.org> >>>>>> Cc: >>>>>> Subject: Re: [m2e-users] Vulnerability problem found in M2E >>>>>> Date: Tue, Nov 17, 2015 3:12 PM >>>>>> It seems unlikely m2e is affected by it. >>>>>> >>>>>> Its been a while but I don't recall m2e using class serialization >>>>>> internally. The bundle suggests the archetypes, I don't know if the >>>>>> maven archetypes use object serialization but since they can already >>>>>> result in arbitrary code being run on your system (via the generated >>>>>> pom) it doesn't seem an attack source. >>>>>> >>>>>> On 17 November 2015 at 16:05, Victor Adrian Sosa Herrera >>>>>> <victo...@mx1.ibm.com> wrote: >>>>>>> Hello Community. >>>>>>> >>>>>>> Throwing again this question to the table. Will this problem be fixed >>>>>>> by m2e team? >>>>>>> >>>>>>> Thanks >>>>>>> >>>>>>> Regards >>>>>>> >>>>>>> >>>>>>> >>>>>>> *Victor Adrian Sosa Herrera* >>>>>>> >>>>>>> >>>>>>> Software Engineer - Rational Application Developer >>>>>>> 2200 Camino A El Castillo >>>>>>> IBM Master Innovator >>>>>>> El Salto, 45680 >>>>>>> Mexico Software Lab >>>>>>> Mexico >>>>>>> C120 >>>>>>> >>>>>>> Q2 >>>>>>> >>>>>>> Phone: >>>>>>> +52-33-3669-7000 x3344[9] >>>>>>> >>>>>>> Mobile: >>>>>>> +52-1-33-1529-6494[10] >>>>>>> >>>>>>> e-mail: >>>>>>> victo...@mx1.ibm.com >>>>>>> >>>>>>> Twitter[11] >>>>>>> >>>>>>> DeveloperWorks blog[12] >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>>> ----- Original message ----- >>>>>>>> From: Victor Adrian Sosa Herrera/Mexico/IBM >>>>>>>> To: m2e-users@eclipse.org >>>>>>>> Cc: >>>>>>>> Subject: Vulnerability problem found in M2E >>>>>>>> Date: Mon, Nov 16, 2015 1:39 PM >>>>>>>> Hello community. >>>>>>>> >>>>>>>> On the past weeks, a security vulnerability was found in Apache >>>>>>>> Commons Collections library, particularly on versions 3.x and 4.x. You >>>>>>>> can see details here >>>>>>>> http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ >>>>>>>> >>>>>>>> The fix is on its way and tracked under this JIRA >>>>>>>> https://issues.apache.org/jira/browse/COLLECTIONS-580 >>>>>>>> >>>>>>>> Now, I've been digging this a little bit and found that one M2E plugin >>>>>>>> is bundling this commons-collections.jar archive, at least on Eclipse >>>>>>>> Luna. Doing a quick search in the Eclipse installation I found this >>>>>>>> org.eclipse.m2e.archetype.common_1.5.0.20140605-2032/commons-collections-3.2.jar >>>>>>>> >>>>>>>> Do you have any plans to patch this plugin with the updated library >>>>>>>> (once available)? >>>>>>>> >>>>>>>> Regards >>>>>>>> >>>>>>>> >>>>>>>> *Victor Adrian Sosa Herrera* >>>>>>>> >>>>>>>> >>>>>>>> Software Engineer - Rational Application Developer >>>>>>>> 2200 Camino A El Castillo >>>>>>>> IBM Master Innovator >>>>>>>> El Salto, 45680 >>>>>>>> Mexico Software Lab >>>>>>>> Mexico >>>>>>>> C120 >>>>>>>> >>>>>>>> Q2 >>>>>>>> >>>>>>>> Phone: >>>>>>>> +52-33-3669-7000 x3344[13] >>>>>>>> >>>>>>>> Mobile: >>>>>>>> +52-1-33-1529-6494[14] >>>>>>>> >>>>>>>> e-mail: >>>>>>>> victo...@mx1.ibm.com >>>>>>>> >>>>>>>> Twitter[15] >>>>>>>> >>>>>>>> DeveloperWorks blog[16] >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> _______________________________________________ >>>>>>> m2e-users mailing list >>>>>>> m2e-users@eclipse.org >>>>>>> To change your delivery options, retrieve your password, or unsubscribe >>>>>>> from this list, visit >>>>>>> https://dev.eclipse.org/mailman/listinfo/m2e-users >>>>>> _______________________________________________ >>>>>> m2e-users mailing list >>>>>> m2e-users@eclipse.org >>>>>> To change your delivery options, retrieve your password, or unsubscribe >>>>>> from this list, visit >>>>>> https://dev.eclipse.org/mailman/listinfo/m2e-users >>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> m2e-users mailing list >>>>> m2e-users@eclipse.org >>>>> To change your delivery options, retrieve your password, or unsubscribe >>>>> from this list, visit >>>>> https://dev.eclipse.org/mailman/listinfo/m2e-users >>>> _______________________________________________ >>>> m2e-users mailing list >>>> m2e-users@eclipse.org >>>> To change your delivery options, retrieve your password, or unsubscribe >>>> from this list, visit >>>> https://dev.eclipse.org/mailman/listinfo/m2e-users >>> >>> >>> >>> _______________________________________________ >>> m2e-users mailing list >>> m2e-users@eclipse.org >>> To change your delivery options, retrieve your password, or unsubscribe from this list, visit >>> https://dev.eclipse.org/mailman/listinfo/m2e-users >> >> >> _______________________________________________ >> m2e-users mailing list >> m2e-users@eclipse.org >> To change your delivery options, retrieve your password, or unsubscribe from this list, visit >> https://dev.eclipse.org/mailman/listinfo/m2e-users > > > > -- > "Have you tried turning it off and on again" - The IT Crowd > And if that fails, then http://goo.gl/tnBgH5 > _________________________________________________ > m2e-users mailing list > m2e-users@eclipse.org > To change your delivery options, retrieve your password, or unsubscribe from > this list, visit > https://dev.eclipse.org/mailman/listinfo/m2e-users Links: 1. tel:%2B52-33-3669-7000%20x3344 2. tel:%2B52-1-33-1529-6494 3. https://twitter.com/sosah_victor 4. https://www.ibm.com/developerworks/community/blogs/victorsh 5. tel:%2B52-33-3669-7000%20x3344 6. tel:%2B52-1-33-1529-6494 7. https://twitter.com/sosah_victor 8. https://www.ibm.com/developerworks/community/blogs/victorsh 9. tel:%2B52-33-3669-7000%20x3344 10. tel:%2B52-1-33-1529-6494 11. https://twitter.com/sosah_victor 12. https://www.ibm.com/developerworks/community/blogs/victorsh 13. tel:%2B52-33-3669-7000%20x3344 14. tel:%2B52-1-33-1529-6494 15. https://twitter.com/sosah_victor 16. https://www.ibm.com/developerworks/community/blogs/victorsh
_______________________________________________ m2e-users mailing list m2e-users@eclipse.org To change your delivery options, retrieve your password, or unsubscribe from this list, visit https://dev.eclipse.org/mailman/listinfo/m2e-users