Page MenuHomePhorge

SecurityTag
ActivePublic

Details

Description
WARNING: Adding objects to this space does not restrict their view policies!

Security-related issues are stored here.

Recent Activity

Wed, Dec 11

valerio.bozzolan changed the visibility for T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Wed, Dec 11, 08:31 · Spam mitigation, Diffusion, Security
valerio.bozzolan closed T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns as Resolved by committing rP7429da91d293: Repository Identity "Automatically Detected User": don't trust unverified emails.
Wed, Dec 11, 08:31 · Spam mitigation, Diffusion, Security
speck added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

Let’s do it

Wed, Dec 11, 02:22 · Spam mitigation, Diffusion, Security

Tue, Dec 10

20after4 added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

If there are no objections I would be happy to accept the diff. @speck are your concerns addressed or should we continue discussion / consider other options?

Tue, Dec 10, 18:15 · Spam mitigation, Diffusion, Security
20after4 added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

What is changing is, that unverified email will not match your unverified email as default, so that should need these 2 clicks manual configs (or, find a way to verify the email)

Tue, Dec 10, 18:10 · Spam mitigation, Diffusion, Security
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

Yep, manually setting your unverified (and not verifiable) email would still be possible 👍 just two clicks are needed from this kind of pages:

Tue, Dec 10, 17:29 · Spam mitigation, Diffusion, Security
20after4 added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

Another edge case: Most of my contributions to Phorge happened as part of my work for Wikimedia. Those commits are under an email address that I no longer have access to, since I am no longer employed at the Wikimedia Foundation.

Tue, Dec 10, 16:47 · Spam mitigation, Diffusion, Security
aklapper added a project to T15074: Hide profile pictures and descriptions of disabled users: Spam mitigation.
Tue, Dec 10, 14:35 · Spam mitigation, Security
valerio.bozzolan added a comment to T15074: Hide profile pictures and descriptions of disabled users.

(I cannot edit this task lol - I would like to add Spam mitigation tag to keep an additional eye on these nice things)

Tue, Dec 10, 13:55 · Spam mitigation, Security
valerio.bozzolan added a project to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns: Spam mitigation.
Tue, Dec 10, 13:54 · Spam mitigation, Diffusion, Security

Mon, Dec 9

valerio.bozzolan renamed T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns from Repository Identity: it reads unverified emails, with spam concerns to Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Mon, Dec 9, 08:56 · Spam mitigation, Diffusion, Security
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

Take for example this commit that has a default identity:

Mon, Dec 9, 08:04 · Spam mitigation, Diffusion, Security
avivey added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

"Steal credit" might actually lead to a real issue: If a new user can get themselves identified as an old, trusted, user based on commit history, their changes might not be checked as rigorously by the rest of the team - similar to the XZ Utils backdoor issue, only faster.

Mon, Dec 9, 07:56 · Spam mitigation, Diffusion, Security
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

Limitation: to steal a commit identity, it must be the default. Sorry I forgot to say.

Mon, Dec 9, 07:33 · Spam mitigation, Diffusion, Security

Sun, Dec 8

valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
In T15965#20052, @speck wrote:

What can a malicious user accomplish by claiming unverified email for commits?

Sun, Dec 8, 18:25 · Spam mitigation, Diffusion, Security

Sat, Dec 7

speck added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

What can a malicious user accomplish by claiming unverified email for commits? The idea outlined here sounds right but I’d like to understand what potential harm could be done on its current state, and also whether there’s any legitimate use case for the current behavior.

Sat, Dec 7, 16:10 · Spam mitigation, Diffusion, Security

Thu, Dec 5

valerio.bozzolan claimed T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Thu, Dec 5, 10:09 · Spam mitigation, Diffusion, Security
valerio.bozzolan updated subscribers of T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.

Adding @aklapper as subscriber in this security issue since I trust this user (unclear if this should be flagged as security thought, feel free to open)

Thu, Dec 5, 10:01 · Spam mitigation, Diffusion, Security
valerio.bozzolan added a revision to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns: D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
Thu, Dec 5, 09:58 · Spam mitigation, Diffusion, Security
valerio.bozzolan created T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Thu, Dec 5, 09:57 · Spam mitigation, Diffusion, Security

May 14 2024

avivey changed the visibility for T15074: Hide profile pictures and descriptions of disabled users.
May 14 2024, 16:00 · Spam mitigation, Security

Mar 17 2024

avivey updated the task description for T15758: Monitor PHPMailer security.
Mar 17 2024, 08:56 · Security

Mar 15 2024

avivey updated the task description for T15758: Monitor PHPMailer security.
Mar 15 2024, 19:30 · Security
avivey added a comment to T15758: Monitor PHPMailer security.

CVE-2017-5223, CVE-2018-19296 and CVE-2020-36326:

Mar 15 2024, 19:30 · Security
avivey added a comment to T15758: Monitor PHPMailer security.

CVE-2021-34551:
This one requires passing user-provided input as a filename to the "setLanguage" method; We don't call that method.

Mar 15 2024, 19:15 · Security
avivey updated the task description for T15758: Monitor PHPMailer security.
Mar 15 2024, 19:00 · Security
avivey added a comment to T15758: Monitor PHPMailer security.

First pass, these one do not apply to us (and some of them do not apply to anyone at all):

Mar 15 2024, 18:56 · Security
avivey triaged T15758: Monitor PHPMailer security as Normal priority.
Mar 15 2024, 18:44 · Security

Nov 13 2023

valerio.bozzolan added a comment to Q83: Pull security fixes from Mozilla's fork.

(I also cannot see T15665)

Nov 13 2023, 15:06 · Security, Phorge

Nov 12 2023

l2dy updated the question details for Q83: Pull security fixes from Mozilla's fork.
Nov 12 2023, 15:42 · Security, Phorge

Nov 11 2023

l2dy updated the question details for Q83: Pull security fixes from Mozilla's fork.
Nov 11 2023, 08:41 · Security, Phorge
l2dy updated the question details for Q83: Pull security fixes from Mozilla's fork.
Nov 11 2023, 08:13 · Security, Phorge

Nov 10 2023

valerio.bozzolan added a comment to Q83: Pull security fixes from Mozilla's fork.

Note that I cannot see Task T15663

Nov 10 2023, 16:45 · Security, Phorge
l2dy changed the visibility for Q83: Pull security fixes from Mozilla's fork.
Nov 10 2023, 16:40 · Security, Phorge
valerio.bozzolan added a comment to Q83: Pull security fixes from Mozilla's fork.

I'm not able to find #conduit in Matrix mozilla.org homeserver btw

Nov 10 2023, 16:11 · Security, Phorge
valerio.bozzolan added a comment to Q83: Pull security fixes from Mozilla's fork.

(It needs to be quoted just in we.phorge.it since indeed we have a Tag called Conduit :D Sorry for that)

Nov 10 2023, 16:10 · Security, Phorge
l2dy updated the question details for Q83: Pull security fixes from Mozilla's fork.
Nov 10 2023, 16:08 · Security, Phorge
l2dy added a comment to Q83: Pull security fixes from Mozilla's fork.

@valerio.bozzolan If you didn't get an answer, try asking in #conduit. I didn't realize that # needs to be quoted in Remarkup. 😢

Nov 10 2023, 16:05 · Security, Phorge
valerio.bozzolan added a comment to Q83: Pull security fixes from Mozilla's fork.

Nice! Thanks

Nov 10 2023, 15:48 · Security, Phorge
l2dy added a comment to Q83: Pull security fixes from Mozilla's fork.

It would be great if Mozilla's team could join forces with Phorge. Would you (the core team) contact them in #conduit on chat.mozilla.org and mozilla.slack.com?

Nov 10 2023, 15:39 · Security, Phorge
l2dy updated the question details for Q83: Pull security fixes from Mozilla's fork.
Nov 10 2023, 13:39 · Security, Phorge
l2dy added a comment to T15045: Support SSL/TLS for MariaDB connections.

I have reviewed it and made some comments. On a remotely related topic, TLS handshakes are expensive and persistent connections can reduce latency and server load by reusing TLS connections, so maybe we should make it configurable outside of cluster.databases as well.

Nov 10 2023, 13:07 · Security
valerio.bozzolan added a comment to Q83: Pull security fixes from Mozilla's fork.

I wonder if they are aware that Phorge exists and that we are open to contributions :)

Nov 10 2023, 13:05 · Security, Phorge

Nov 7 2023

valerio.bozzolan added a project to Q83: Pull security fixes from Mozilla's fork: Security.
Nov 7 2023, 09:46 · Security, Phorge

Jul 22 2023

speck added a comment to T15045: Support SSL/TLS for MariaDB connections.

I have this working now in https://we.phorge.it/D25276. I still have it marked as draft because there are some outstanding things that should be decided/addressed

  1. Whether client certificate should be configurable. Ideally this is something that would be configured in the php.ini rather than directly in phorge but at the moment I don't think it can be.
  2. Updating documentation to specify how to set up TLS/SSL. For database configurations there's now a use-tls flag which will require connecting to the database using TLS. Turning on TLS/SSL on the database we can probably provide pointers but it's left to the reader for determining that based on their database.
  3. Database clusters with master & replicas? I don't know how to set this up. Those changes might affect cluster dbs but I'm unsure and it's untested.
Jul 22 2023, 04:11 · Security

Jul 20 2023

RhinosF1 changed the edit policy for T15563: Test.
Jul 20 2023, 17:18 · Security
RhinosF1 changed the visibility for T15563: Test.
Jul 20 2023, 17:18 · Security
RhinosF1 closed T15563: Test as Invalid.

Worked

Jul 20 2023, 17:18 · Security
RhinosF1 created T15563: Test.
Jul 20 2023, 17:17 · Security

Jul 19 2023

speck added a comment to T15045: Support SSL/TLS for MariaDB connections.

I picked this up again recently. I’m stuck on getting mariadb valid certificates it uses for connections, for testing my Phorge changes.

Jul 19 2023, 11:43 · Security