-
-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
run container as non root user #33
base: main
Are you sure you want to change the base?
Conversation
🔍 Vulnerabilities of
|
digest | sha256:85e2df67102ea16387af45df974bbf68148ff723f32f36dd633bcf9f8b88138a |
vulnerabilities | |
size | 158 MB |
packages | 324 |
📦 Base Image ruby:2-alpine
also known as |
|
digest | sha256:45ca5ff1e098ddc85430bad09d433dfab4be9417477a5778568a7877408f1cd0 |
vulnerabilities |
rexml
|
Affected range | <3.2.5 |
Fixed version | 3.2.5 |
CVSS Score | 7.5 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
EPSS Score | 0.10% |
EPSS Percentile | 43rd percentile |
Description
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
Uncontrolled Resource Consumption
Affected range | <3.3.3 |
Fixed version | 3.3.3 |
CVSS Score | 5.3 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Impact
The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API.
If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability.
Patches
The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
Workarounds
Don't parse untrusted XMLs with SAX2 or pull parser API.
References
- https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org
Uncontrolled Resource Consumption
Affected range | <3.3.3 |
Fixed version | 3.3.3 |
CVSS Score | 5.3 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Impact
The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character,
>]
and]>
.If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.
Patches
The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
Workarounds
Don't parse untrusted XMLs.
References
- GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability
- GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org
Uncontrolled Resource Consumption
Affected range | <3.2.7 |
Fixed version | 3.2.7 |
CVSS Score | 5.3 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
EPSS Score | 0.04% |
EPSS Percentile | 16th percentile |
Description
Impact
The REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many
<
s in an attribute value.If you need to parse untrusted XMLs, you may be impacted to this vulnerability.
Patches
The REXML gem 3.2.7 or later include the patch to fix this vulnerability.
Workarounds
Don't parse untrusted XMLs.
References
Uncontrolled Resource Consumption
Affected range | <3.3.2 |
Fixed version | 3.3.2 |
CVSS Score | 4.3 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
EPSS Score | 0.04% |
EPSS Percentile | 9th percentile |
Description
Impact
The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as
<
,0
and%>
.If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities.
Patches
The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities.
Workarounds
Don't parse untrusted XMLs.
References
- GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability
- https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/
bundler 2.1.4
(gem)
pkg:gem/[email protected]
Affected range | >=1.16.0 |
Fixed version | 2.2.10 |
CVSS Score | 8.8 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
EPSS Score | 0.97% |
EPSS Percentile | 84th percentile |
Description
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Affected range | <2.2.33 |
Fixed version | 2.2.33 |
CVSS Score | 6.7 |
CVSS Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
EPSS Score | 0.12% |
EPSS Percentile | 46th percentile |
Description
In
bundler
versions before 2.2.33, when working with untrusted and apparently harmlessGemfile
's, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside theGemfile
itself. However, if theGemfile
includesgem
entries that use thegit
option with invalid, but seemingly harmless, values with a leading dash, this can be false.To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as
git clone
. These commands are being constructed using user input (e.g. the repository URL). When building the
commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (-
) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables.Since this value comes from the
Gemfile
file, it can contain any character, including a leading dash.Exploitation
To exploit this vulnerability, an attacker has to craft a directory containing a
Gemfile
file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of-u./payload
. This URL
will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such asbundle lock
, inside.Impact
This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the
Gemfile
(although they would need the weird URL with a leading dash to not raise any flags).This kind of attack vector has been used in the past to target security researchers by sending them projects to collaborate on.
Patches
Bundler 2.2.33 has patched this problem by inserting
--
as an argument before any positional arguments to those Git commands that were affected by this issue.Workarounds
Regardless of whether users can upgrade or not, they should review any untrustred
Gemfile
's before running anybundler
commands that may read them, since they can contain arbitrary ruby code.References
rdoc 6.2.1.1
(gem)
pkg:gem/[email protected]
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
Affected range | >=3.11 |
Fixed version | 6.3.1 |
CVSS Score | 7 |
CVSS Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
EPSS Score | 0.06% |
EPSS Percentile | 29th percentile |
Description
In RDoc, as distributed with Ruby, it is possible to execute arbitrary code via
|
and tags in a filename.
uri 0.10.0.2
(gem)
pkg:gem/[email protected]
Inefficient Regular Expression Complexity
Affected range | <0.10.0.3 |
Fixed version | 0.10.3 |
CVSS Score | 5.3 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
EPSS Score | 0.15% |
EPSS Percentile | 51st percentile |
Description
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with
rfc2396_parser.rb
andrfc3986_parser.rb
.NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
The Ruby advisory recommends updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead:
- For Ruby 3.0: Update to uri 0.10.3
- For Ruby 3.1 and 3.2: Update to uri 0.12.2.
You can use gem update uri to update it. If you are using bundler, please add gem
uri
,>= 0.12.2
(or other version mentioned above) to your Gemfile.
curl 8.5.0-r0
(apk)
pkg:apk/alpine/[email protected]?os_name=alpine&os_version=3.16
Affected range | <8.6.0-r0 |
Fixed version | Not Fixed |
EPSS Score | 0.06% |
EPSS Percentile | 25th percentile |
Description
hmm, damn, in my local tests this worked :( |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
95fb55e
to
a9dcd36
Compare
.github/workflows/ci.yaml
Outdated
docker run --user 1001 --rm -v $(pwd):/repo ci/voxbox-${{ matrix.rubygem_puppet }}:${{ github.sha }} -f /Rakefile syntax | ||
docker run --user 1001 --rm -v $(pwd):/repo ci/voxbox-${{ matrix.rubygem_puppet }}:${{ github.sha }} -f /Rakefile spec | ||
docker run --user 1001 --rm -v $(pwd):/repo ci/voxbox-${{ matrix.rubygem_puppet }}:${{ github.sha }} -f /Rakefile r10k:syntax | ||
docker run --user 1001 --rm -v $(pwd):/repo ci/voxbox-${{ matrix.rubygem_puppet }}:${{ github.sha }} -f /Rakefile r10k:dependencies |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
when we use the container locally, do we now have to set --user
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no, you just can used it as always. at least on my mac it was working like this.
can you maybe test this on a non mac?
docker build -t voxbox-local .
cd path/to/puppet-example
docker run -it --rm -v $(pwd):/repo voxbox-local -f /Rakefile strings:validate:reference
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it could be, that one does need code like this in a compose file. but thats how this id done, afaik
environment:
- PUID=1001
- PGID=1001
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
build output: https://gist.github.com/bastelfreak/4cc2e9febafd4f40cf4a0769ad3c9672
and the rake task fails:
$ docker run -it --rm -v $(pwd):/repo voxbox-local -f /Rakefile strings:validate:reference
/usr/local/bundle/gems/io-event-1.6.5/lib/io/event/support.rb:27: warning: IO::Buffer is experimental and both the Ruby and C interface may change in the future!
WARN: Unresolved or ambiguous specs during Gem::Specification.reset:
racc (>= 0)
Available/installed versions of this gem:
- 1.8.1
- 1.6.2
minitest (>= 5.1, ~> 5.4)
Available/installed versions of this gem:
- 5.24.1
- 5.16.3
drb (>= 0)
Available/installed versions of this gem:
- 2.2.1
- 2.1.1
mutex_m (>= 0)
Available/installed versions of this gem:
- 0.2.0
- 0.1.2
WARN: Clearing out unresolved specs. Try 'gem cleanup <gem>'
Please report a bug if this causes problems.
rake aborted!
Errno::EACCES: Permission denied @ dir_s_mkdir - .yardoc (Errno::EACCES)
/usr/local/bundle/gems/yard-0.9.36/lib/yard/core_ext/file.rb:59:in `open!'
/usr/local/bundle/gems/yard-0.9.36/lib/yard/serializers/yardoc_serializer.rb:55:in `lock_for_writing'
/usr/local/bundle/gems/yard-0.9.36/lib/yard/registry_store.rb:202:in `lock_for_writing'
/usr/local/bundle/gems/yard-0.9.36/lib/yard/registry.rb:210:in `lock_for_writing'
/usr/local/bundle/gems/yard-0.9.36/lib/yard/cli/yardoc.rb:258:in `run'
/usr/local/bundle/gems/yard-0.9.36/lib/yard/cli/command.rb:14:in `run'
/usr/local/bundle/gems/puppet-strings-4.1.2/lib/puppet-strings.rb:48:in `generate'
/usr/local/bundle/gems/puppet-strings-4.1.2/lib/puppet-strings/tasks/validate.rb:29:in `block (4 levels) in <top (required)>'
/usr/local/bundle/gems/puppet-strings-4.1.2/lib/puppet-strings/tasks/validate.rb:21:in `block (3 levels) in <top (required)>'
/usr/local/bundle/gems/rake-13.2.1/exe/rake:27:in `<top (required)>'
Tasks: TOP => strings:validate:reference
(See full trace by running task with --trace)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i cannot find how to prevent yard from creating this dir. also i read on the net, that it is common to run the container with --user
? any opinions on this?
.github/workflows/ci.yaml
Outdated
@@ -53,6 +57,12 @@ jobs: | |||
RUBYGEM_OVERCOMMIT=${{ matrix.rubygem_overcommit }} | |||
RUBYGEM_MODULESYNC=${{ matrix.rubygem_modulesync }} | |||
|
|||
- name: Upload voxbox-${{ matrix.rubygem_puppet }}_${{ github.sha }}.tar | |||
uses: actions/upload-artifact@v4 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why does the step exist? so the other job can acccess the build artifact?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TLDR: yes
if you build a container in on job, you cannot use it in another, because the local registry gets cleaned. So im uploading it as an artifact and donwload it in the next again
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think there's an artifact size limit we have per repo. I don't know if artifacts expire after X days or if we need to purge them. We should check that in some weeks.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
was thinking about this too, but then forgot 👍
- also update gha setup to reflect this change - differentiate between build and test of the container Signed-off-by: Robert Waffen <[email protected]>
Signed-off-by: Robert Waffen <[email protected]>
a9dcd36
to
1b8227d
Compare
Dockerfile
Outdated
@@ -73,5 +73,8 @@ RUN apk update \ | |||
|
|||
WORKDIR /repo | |||
|
|||
RUN addgroup -S voxbox && adduser -S voxbox -G voxbox |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what do those parameters do? Is there maybe a long version that we could use? I think that makes the whole Dockerfile easier to read.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nein! there are no long parameters in alpine. it may cost to much space! -S is for system
/ # addgroup --help
BusyBox v1.36.1 (2024-06-10 07:11:47 UTC) multi-call binary.
Usage: addgroup [-g GID] [-S] [USER] GROUP
Add a group or add a user to a group
-g GID Group id
-S Create a system group
/ # adduser --help
BusyBox v1.36.1 (2024-06-10 07:11:47 UTC) multi-call binary.
Usage: adduser [OPTIONS] USER [GROUP]
Create new user, or add USER to GROUP
-h DIR Home directory
-g GECOS GECOS field
-s SHELL Login shell
-G GRP Group
-S Create a system user
-D Don't assign a password
-H Don't create home directory
-u UID User id
-k SKEL Skeleton directory (/etc/skel)
/ #
Signed-off-by: Robert Waffen <[email protected]>
No description provided.