Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-40034: Validate webhook before change any data (#2221) (#2222) · woodpecker-ci/woodpecker@6e4c2f8

Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. This issue has been addressed in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.

CVE
#web#auth

Expand Up @@ -108,6 +108,10 @@ func PostHook(c *gin.Context) { _store := store.FromContext© forge := server.Config.Services.Forge
// // 1. Parse webhook //
tmpRepo, tmpBuild, err := forge.Hook(c, c.Request) if err != nil { if errors.Is(err, &types.ErrIgnoreEvent{}) { Expand Down Expand Up @@ -136,6 +140,11 @@ func PostHook(c *gin.Context) { return }
// // Skip if commit message contains skip-ci // TODO: move into global pipeline conditions logic //
// skip the tmpBuild if any case-insensitive combination of the words “skip” and “ci” // wrapped in square brackets appear in the commit message skipMatch := skipRe.FindString(tmpBuild.Message) Expand All @@ -146,6 +155,10 @@ func PostHook(c *gin.Context) { return }
// // 2. Get related repo from store and take repo renaming into account //
repo, err := _store.GetRepoNameFallback(tmpRepo.ForgeRemoteID, tmpRepo.FullName) if err != nil { msg := fmt.Sprintf("failure to get repo %s from store", tmpRepo.FullName) Expand All @@ -159,24 +172,19 @@ func PostHook(c *gin.Context) { c.String(http.StatusNoContent, msg) return }
oldFullName := repo.FullName if oldFullName != tmpRepo.FullName { // create a redirection err = _store.CreateRedirection(&model.Redirection{RepoID: repo.ID, FullName: repo.FullName}) if err != nil { _ = c.AbortWithError(http.StatusInternalServerError, err) return } }
repo.Update(tmpRepo) err = _store.UpdateRepo(repo) if err != nil { c.String(http.StatusInternalServerError, err.Error()) if repo.UserID == 0 { msg := fmt.Sprintf("ignoring hook. repo %s has no owner.", repo.FullName) log.Warn().Msg(msg) c.String(http.StatusNoContent, msg) return }
// // 3. Check if the webhook is a valid and authorized one //
// get the token and verify the hook is authorized parsed, err := token.ParseRequest(c.Request, func(_ *token.Token) (string, error) { return repo.Hash, nil Expand Down Expand Up @@ -205,20 +213,41 @@ func PostHook(c *gin.Context) { return }
if repo.UserID == 0 { msg := fmt.Sprintf("ignoring hook. repo %s has no owner.", repo.FullName) log.Warn().Msg(msg) c.String(http.StatusNoContent, msg) // // 4. Update repo //
if oldFullName != tmpRepo.FullName { // create a redirection err = _store.CreateRedirection(&model.Redirection{RepoID: repo.ID, FullName: repo.FullName}) if err != nil { _ = c.AbortWithError(http.StatusInternalServerError, err) return } }
repo.Update(tmpRepo) err = _store.UpdateRepo(repo) if err != nil { c.String(http.StatusInternalServerError, err.Error()) return }
// // 5. Check if pull requests are allowed for this repo //
if tmpBuild.Event == model.EventPull && !repo.AllowPull { msg := “ignoring hook: pull requests are disabled for this repo in woodpecker” log.Debug().Str("repo", repo.FullName).Msg(msg) c.String(http.StatusNoContent, msg) return }
// // 6. Finally create a pipeline //
pl, err := pipeline.Create(c, _store, repo, tmpBuild) if err != nil { handlePipelineErr(c, err) Expand Down

Related news

GHSA-4gcf-5m39-98mc: Woodpecker does not validate webhook before changing any data

### Impact An attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. ### Patches Please use either next or the latest v1.0 e.g. v1.0.2 ### Workarounds Secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall. ### References Fix: https://github.com/woodpecker-ci/woodpecker/pull/2221 Backport: https://github.com/woodpecker-ci/woodpecker/pull/2222

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907