Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduced protections against system command injection #2011

Merged

Conversation

pixeebot[bot]
Copy link
Contributor

@pixeebot pixeebot bot commented Oct 14, 2024

This change hardens all instances of Runtime#exec() to offer protection against attack.

Left unchecked, Runtime#exec() can execute any arbitrary system command. If an attacker can control part of the strings used to as program paths or arguments, they could execute arbitrary programs, install malware, and anything else they could do if they had a shell open on the application host.

Our change introduces a sandbox which protects the application:

+ import io.github.pixee.security.SystemCommand;
  ...
- Process p = Runtime.getRuntime().exec(command);
+ Process p = SystemCommand.runCommand(Runtime.getRuntime(), command);

The default restrictions applied are the following:

  • Prevent command chaining. Many exploits work by injecting command separators and causing the shell to interpret a second, malicious command. The SystemCommand#runCommand() attempts to parse the given command, and throw a SecurityException if multiple commands are present.
  • Prevent arguments targeting sensitive files. There is little reason for custom code to target sensitive system files like /etc/passwd, so the sandbox prevents arguments that point to these files that may be targets for exfiltration.

There are more options for sandboxing if you are interested in locking down system commands even more.

❌ The following packages couldn't be installed automatically, probably because the dependency manager is unsupported. Please install them manually:

Gradle
dependencies {
  implementation("io.github.pixee:java-security-toolkit:1.2.0")
}
Maven
<dependencies>
  <dependency>
    <groupId>io.github.pixee</groupId>
    <artifactId>java-security-toolkit</artifactId>
    <version>1.2.0</version>
  </dependency>
<dependencies>
More reading

I have additional improvements ready for this repo! If you want to see them, leave the comment:

@pixeebot next

... and I will open a new PR right away!

🧚🤖 Powered by Pixeebot

Feedback | Community | Docs | Codemod ID: pixee:java/harden-process-creation

@pixeebot pixeebot bot requested a review from Frooodle as a code owner October 14, 2024 04:51
@github-actions github-actions bot added the Java Pull requests that update Java code label Oct 14, 2024
@Frooodle
Copy link
Member

Frooodle commented Oct 14, 2024

@pixeebot We also use ProcessBuilder to run some commands if you can add similar feature for that 👀

Copy link
Contributor

🚀 Translation Verification Summary

📋 Checking with the file messages_en_GB.properties from the main-branch - Checking the pr-branch

🗂️ Checking File: messages_pt_BR.properties...

  • Test 1 Status: ✅ Passed
  • Test 2 Status: ✅ Passed

✅ Overall Check Status: Success

@Frooodle Frooodle merged commit b315649 into main Oct 17, 2024
11 checks passed
@Frooodle Frooodle deleted the pixeebot/drip-2024-10-14-pixee-java/harden-process-creation branch October 17, 2024 23:10
@nahsra
Copy link

nahsra commented Oct 18, 2024

@pixeebot We also use ProcessBuilder to run some commands if you can add similar feature for that 👀

Thanks for the note! We added a ticket.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Java Pull requests that update Java code Translation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants