fix: the run in run.py#1
Conversation
Automated security fix generated by OrbisAI Security
|
Thank you for the pull request. This repository archives original CTF challenge files for educational and research purposes. I agree that downloading and executing user-provided URLs would be unsafe in a production service. Also, this patch changes the original distribution behavior while only partially addressing the reported issue. Thanks again for taking the time to report it. |
Summary
Fix critical severity security issue in
2023/idekCTF_2022/Pwn_Sofire=good/distribution/remote/run.py.Vulnerability
V-0022023/idekCTF_2022/Pwn_Sofire=good/distribution/remote/run.py:10Description: The run.py script accepts a URL from user input, downloads the referenced executable without any integrity verification (no checksum, no cryptographic signature, no file type validation), and executes it via ./run.sh. There is no authentication on the service, no allowlist of trusted domains, and no sandboxing of the executed binary. Any party with access to the input prompt can supply a URL to a malicious binary and have it executed on the server with the privileges of the running process.
Changes
2023/idekCTF_2022/Pwn_Sofire=good/distribution/remote/run.pyVerification