Security-related issues are stored here.
Details
Sun, Mar 30
Why would a cancel URI be needed? Do you know a Cancel URI for an app with something that prompts for MFA (ie. exposing Passphrases, empowering users, signing comments with MFA, managing your VCS password and SSH keys)
That's what I tested (as the Files application can be uninstalled). Which exact application(s) did you test?
I'm surprised that you did not run into the same problem as I did described in my last comment...maybe it's related to not being an admin?
Any application were canUninstall is not set to false (thus not a required application).
As which type of user?
A user with the Can Configure Application capability (by default admins).
Clear Test Plans with URIs are welcome - the less others need to think "how/where to do that" the easier gets testing.
Sat, Mar 29
I don't know if what I done on D25935 is correct, but as usual, Request Changes if I did it wrong.
I relied on the code on PhabricatorUserEmpowerTransaction to try to make PhabricatorApplicationUninstallTransaction require MFA if enabled.
Make lint happy
Tue, Mar 25
Dec 27 2024
Dec 26 2024
Dec 11 2024
Let’s do it
Dec 10 2024
If there are no objections I would be happy to accept the diff. @speck are your concerns addressed or should we continue discussion / consider other options?
Yep, manually setting your unverified (and not verifiable) email would still be possible 👍 just two clicks are needed from this kind of pages:
Another edge case: Most of my contributions to Phorge happened as part of my work for Wikimedia. Those commits are under an email address that I no longer have access to, since I am no longer employed at the Wikimedia Foundation.
(I cannot edit this task lol - I would like to add Spam mitigation tag to keep an additional eye on these nice things)
Dec 9 2024
Take for example this commit that has a default (empty) identity:
"Steal credit" might actually lead to a real issue: If a new user can get themselves identified as an old, trusted, user based on commit history, their changes might not be checked as rigorously by the rest of the team - similar to the XZ Utils backdoor issue, only faster.
Limitation: to steal a commit identity, it must be the default. Sorry I forgot to say.
Dec 8 2024
Dec 7 2024
What can a malicious user accomplish by claiming unverified email for commits? The idea outlined here sounds right but I’d like to understand what potential harm could be done on its current state, and also whether there’s any legitimate use case for the current behavior.
Dec 5 2024
Adding @aklapper as subscriber in this security issue since I trust this user (unclear if this should be flagged as security thought, feel free to open)
May 14 2024
Mar 17 2024
Mar 15 2024
CVE-2017-5223, CVE-2018-19296 and CVE-2020-36326:
CVE-2021-34551:
This one requires passing user-provided input as a filename to the "setLanguage" method; We don't call that method.
First pass, these one do not apply to us (and some of them do not apply to anyone at all):
Nov 13 2023
(I also cannot see T15665)
Nov 12 2023
Nov 11 2023
Nov 10 2023
Note that I cannot see Task T15663
I'm not able to find #conduit in Matrix mozilla.org homeserver btw
(It needs to be quoted just in we.phorge.it since indeed we have a Tag called Conduit :D Sorry for that)
@valerio.bozzolan If you didn't get an answer, try asking in #conduit. I didn't realize that # needs to be quoted in Remarkup. 😢