You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A malicious user can replace the script code with any code which would be run with the next build process.
Of course this is not a problem on build hosts with a single user or only trusted users as long as these build hosts cannot be accessed from outside (otherwise for example security issues in web applications could be used to modify the script files). But if this is a precondition for secure builds, it must be mentioned prominently.
To Reproduce
Steps to reproduce the behavior:
Clone kitodo-production and enter its root directory.
Prepare the build und run mvn clean build (optionally with additional parameters).
The scripts listed above are now world-writable.
Expected behavior
The build process must not create files which are world-writable.
Release
The bug exists for a long time now – also in the latest code.
The text was updated successfully, but these errors were encountered:
Describe the bug
After running
mvn clean build
several script files are writable for any user who has access to the build host:A malicious user can replace the script code with any code which would be run with the next build process.
Of course this is not a problem on build hosts with a single user or only trusted users as long as these build hosts cannot be accessed from outside (otherwise for example security issues in web applications could be used to modify the script files). But if this is a precondition for secure builds, it must be mentioned prominently.
To Reproduce
Steps to reproduce the behavior:
mvn clean build
(optionally with additional parameters).Expected behavior
The build process must not create files which are world-writable.
Release
The bug exists for a long time now – also in the latest code.
The text was updated successfully, but these errors were encountered: