Hi Netty Security Team,
I've been working on some security research leveraging custom CodeQL queries to detect local information disclosure vulnerabilities in java applications. This was the result from running this query against the netty project:
https://lgtm.com/query/7723301787255288599/
Netty contains three local information disclosure vulnerabilities, so far as I can tell.
One is here, where the private key for the certificate is written to a temporary file.
https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L316-L346
One is here, where the certificate is written to a temporary file.
https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L348-L371
The final one is here, where the 'AbstractDiskHttpData' creates a temporary file if the getBaseDirectory() method returns null. I believe that 'AbstractDiskHttpData' is used as a part of the file upload support? If this is the case, any files uploaded would be similarly vulnerable.
https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L91
All of these vulnerabilities exist because
File.createTempFile(String, String)
will create a temporary file in the system temporary directory if the 'java.io.tmpdir' system property is not explicitly set. It is my understanding that when java creates a file, by default, and using this method, the permissions on that file utilize the umask. In a majority of cases, this means that the file that java creates has the permissions:
-rw-r--r--
, thus, any other local user on that system can read the contents of that file.
Impacted OS:
Any OS where the system temporary directory is shared between multiple users. This is not the case for MacOS or Windows.
Mitigation.
Moving to the
Files
API instead will fix this vulnerability.
https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile-java.nio.file.Path-java.lang.String-java.lang.String-java.nio.file.attribute.FileAttribute...-
This API will explicitly set the posix file permissions to something safe, by default.
I recently disclosed a similar vulnerability in JUnit 4:
https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
If you're also curious, this vulnerability in Jetty was also mine, also involving temporary directories, but is not the same vulnerability as in this case.
https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
I would appreciate it if we could perform disclosure of this vulnerability leveraging the GitHub security advisories feature here. GitHub has a nice credit system that I appreciate, plus the disclosures, as you can see from the sampling above, end up looking very nice.
https://github.com/netty/netty/security/advisories
This vulnerability disclosure follows Google's
90-day vulnerability disclosure policy (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.
Cheers,
Jonathan Leitschuh