Skip Menu |

This queue is for tickets about the Win32API-File CPAN distribution.

Report information
The Basics
Id: 130693
Status: open
Priority: 0/
Queue: Win32API-File

People
Owner: Nobody in particular
Requestors: biejunh [...] cn.ibm.com
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)

Attachments
static Strawberry Perl (32_64) 20190925_16_05_20191010_14_46_57.html



Subject: security vulnerabilities discovered on Win32API::File modules
Date: Sat, 12 Oct 2019 06:12:27 +0000
To: bug-Win32API-File [...] rt.cpan.org
From: "Jun Hua Bie" <biejunh [...] cn.ibm.com>
Hello Win32API-File bug team, We are using Strawberry Perl 5.30.0.1 and some Perl modules on our application, according to company's security policy, we ran static code scanning for these open source code, but some security vulnerabilities are discovered during scanning. Ungrouped Missing Setuid (PrivilegeEscalation, CWE-266) CWE: 266 API: Missing Setuid Caller: src\perl32\site\lib\AnyEvent\Util.pm at line 725 call :close ($_) src\perl32\site\lib\AnyEvent\Handle.pm at line 264 call write (triggered when nothing was read I<OR> written) src\perl32\site\lib\AnyEvent\Handle.pm at line 265 call read (triggered when nothing was read) src\perl32\site\lib\AnyEvent\Handle.pm at line 1980 call read (and buffer) src\perl32\site\lib\AnyEvent\Handle.pm at line 2083 call :read ($self->{tls}) src\perl32\site\lib\AnyEvent\Util.pm at line 450 call :close ($_) src\perl32\site\lib\AnyEvent\Util.pm at line 459 call :close ($_) src\perl64\site\lib\AnyEvent\Handle.pm at line 264 call write (triggered when nothing was read I<OR> written) src\perl64\site\lib\AnyEvent\Handle.pm at line 265 call read (triggered when nothing was read) src\perl64\site\lib\AnyEvent\Handle.pm at line 2070 call :write ($self->{tls}, $self->{_tls_wbuf}) src\perl64\site\lib\AnyEvent\Handle.pm at line 1980 call read (and buffer) src\perl64\site\lib\AnyEvent\Handle.pm at line 2083 call :read ($self->{tls}) src\perl64\site\lib\AnyEvent\Util.pm at line 450 call :close ($_) src\perl64\site\lib\AnyEvent\Util.pm at line 459 call :close ($_) src\perl64\site\lib\AnyEvent\Util.pm at line 725 call :close ($_) src\perl32\site\lib\AnyEvent\Handle.pm at line 2070 call :write ($self->{tls}, $self->{_tls_wbuf}) For the details, please refer to following reporting: Do you have any solution to fix these security issues ? It is very urgent for us to fix these issues for our project, could you take it as high priority ? Thanks in advance ! Best Regards, Jun Hua Bie Senior IT Specialist Global Technical Service IBM Service Mobile: +86-138-2370-2390 mailto:biejunh@cn.ibm.com

Message body is not shown because sender requested not to inline it.

On Sat Oct 12 08:30:29 2019, biejunh@cn.ibm.com wrote: Show quoted text
> Hello Win32API-File bug team, > > We are using Strawberry Perl 5.30.0.1 and some Perl modules on our > application, according to company's security policy, we ran static code > scanning for these open source code, but some security vulnerabilities are > discovered during scanning. > Ungrouped Missing Setuid (PrivilegeEscalation, CWE-266) > CWE: 266 > API: Missing Setuid > Caller: > src\perl32\site\lib\AnyEvent\Util.pm at line 725 call :close > ($_) > src\perl32\site\lib\AnyEvent\Handle.pm at line 264 call write > (triggered when nothing was read I<OR> written) > src\perl32\site\lib\AnyEvent\Handle.pm at line 265 call read > (triggered when nothing was read) > src\perl32\site\lib\AnyEvent\Handle.pm at line 1980 call read (and > buffer) > src\perl32\site\lib\AnyEvent\Handle.pm at line 2083 call :read > ($self->{tls}) > src\perl32\site\lib\AnyEvent\Util.pm at line 450 call :close > ($_) > src\perl32\site\lib\AnyEvent\Util.pm at line 459 call :close > ($_) > src\perl64\site\lib\AnyEvent\Handle.pm at line 264 call write > (triggered when nothing was read I<OR> written) > src\perl64\site\lib\AnyEvent\Handle.pm at line 265 call read > (triggered when nothing was read) > src\perl64\site\lib\AnyEvent\Handle.pm at line 2070 call :write > ($self->{tls}, $self->{_tls_wbuf}) > src\perl64\site\lib\AnyEvent\Handle.pm at line 1980 call read (and > buffer) > src\perl64\site\lib\AnyEvent\Handle.pm at line 2083 call :read > ($self->{tls}) > src\perl64\site\lib\AnyEvent\Util.pm at line 450 call :close > ($_) > src\perl64\site\lib\AnyEvent\Util.pm at line 459 call :close > ($_) > src\perl64\site\lib\AnyEvent\Util.pm at line 725 call :close > ($_) > src\perl32\site\lib\AnyEvent\Handle.pm at line 2070 call :write > ($self->{tls}, $self->{_tls_wbuf}) > > For the details, please refer to following reporting: > > > > Do you have any solution to fix these security issues ? It is very > urgent for us to fix these issues for our project, could you take it as > high priority ? > Thanks in advance ! > > Best Regards, > Jun Hua Bie > Senior IT Specialist > Global Technical Service > IBM Service > Mobile: +86-138-2370-2390 > mailto:biejunh@cn.ibm.com >
This is the Win32API::File queue, and you've reported issues with Anyevent. Also note that the Anyevent author doesn't use rt as a bug tracker: https://metacpan.org/pod/AnyEvent#SUPPORT https://rt.cpan.org/Ticket/Display.html?id=124723#txn-1775673 Context: https://rt.cpan.org/Ticket/Display.html?id=130688
Subject: Re: [rt.cpan.org #130693] security vulnerabilities discovered on Win32API::File modules
Date: Sun, 13 Oct 2019 09:12:43 +0800
To: bug-Win32API-File [...] rt.cpan.org
From: "Jun Hua Bie" <biejunh [...] cn.ibm.com>
Hello team, The issues related to Win32API::File modules as below: Win32API::File Ungrouped Missing Setuid (PrivilegeEscalation, CWE-266) CWE: 266 API: Missing Setuid Caller: src\perl32\lib\Win32API\File.pm at line 321 call open( $fh, $pref."&=".(0+$fd) src\perl32\lib\Win32API\File.pm at line 571 call >open(@_) src\perl64\lib\Win32API\File.pm at line 321 call open( $fh, $pref."&=".(0+$fd) src\perl64\lib\Win32API\File.pm at line 571 call >open(@_) src\perl32\lib\Win32API\File.pm at line 678 call >WRITE($buf, length($buf) src\perl64\lib\Win32API\File.pm at line 678 call >WRITE($buf, length($buf) Ungrouped File Open Mode Is User Modifiable (AccessControl.Bypass, CWE-288) CWE: 288 API: File Open Mode Is User Modifiable Caller: src\perl32\lib\Win32API\File.pm at line 321 call open( $fh, $pref."&=".(0+$fd) src\perl32\lib\Win32API\File.pm at line 571 call >open(@_) src\perl64\lib\Win32API\File.pm at line 321 call open( $fh, $pref."&=".(0+$fd) src\perl64\lib\Win32API\File.pm at line 571 call >open(@_) I recieved an email from Net::SSLeay modules bug team, it seems those issues can be identified as false positives in the code analyser. These appear to be false positives in the code analyser you're using: the use of select(), write() and close() in Net::SSLeay::Handle doesn't present a privilege escalation risk. It should be safe to ignore these warnings. Is it same for Win32API::File modules, can we identify them as false positives ? Thanks in advance ! Best Regards, Jun Hua Bie Senior IT Specialist Global Technical Service IBM Service Mobile: +86-138-2370-2390 mailto:biejunh@cn.ibm.com From: "Martin McGrath via RT" <bug-Win32API-File@rt.cpan.org> To: biejunh@cn.ibm.com Date: 10/12/2019 06:09 PM Subject: [EXTERNAL] [rt.cpan.org #130693] security vulnerabilities discovered on Win32API::File modules <URL: https://urldefense.proofpoint.com/v2/url?u=https-3A__rt.cpan.org_Ticket_Display.html-3Fid-3D130693&d=DwIDaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=4MLB-6domc4LM1xvz-t0YzG0kMlwZLc4B-aLJcWPH4o&m=JToT6u8s5fQWWH6hecx_zNQOL8eEm-TkOprgQd7KBm4&s=kyeiGZfrUPqFSLBK4CCtbvkkdKdeA-pf35TJ-fqZkBI&e= Show quoted text
>
On Sat Oct 12 08:30:29 2019, biejunh@cn.ibm.com wrote: Show quoted text
> Hello Win32API-File bug team, > > We are using Strawberry Perl 5.30.0.1 and some Perl modules on our > application, according to company's security policy, we ran static code
Show quoted text
> scanning for these open source code, but some security vulnerabilities
are Show quoted text
> discovered during scanning. > Ungrouped Missing Setuid (PrivilegeEscalation, CWE-266) > CWE: 266 > API: Missing Setuid > Caller: > src\perl32\site\lib\AnyEvent\Util.pm at line 725 call :close > ($_) > src\perl32\site\lib\AnyEvent\Handle.pm at line 264 call write > (triggered when nothing was read I<OR> written) > src\perl32\site\lib\AnyEvent\Handle.pm at line 265 call read > (triggered when nothing was read) > src\perl32\site\lib\AnyEvent\Handle.pm at line 1980 call read
(and Show quoted text
> buffer) > src\perl32\site\lib\AnyEvent\Handle.pm at line 2083 call :read > ($self->{tls}) > src\perl32\site\lib\AnyEvent\Util.pm at line 450 call :close > ($_) > src\perl32\site\lib\AnyEvent\Util.pm at line 459 call :close > ($_) > src\perl64\site\lib\AnyEvent\Handle.pm at line 264 call write > (triggered when nothing was read I<OR> written) > src\perl64\site\lib\AnyEvent\Handle.pm at line 265 call read > (triggered when nothing was read) > src\perl64\site\lib\AnyEvent\Handle.pm at line 2070 call :write > ($self->{tls}, $self->{_tls_wbuf}) > src\perl64\site\lib\AnyEvent\Handle.pm at line 1980 call read
(and Show quoted text
> buffer) > src\perl64\site\lib\AnyEvent\Handle.pm at line 2083 call :read > ($self->{tls}) > src\perl64\site\lib\AnyEvent\Util.pm at line 450 call :close > ($_) > src\perl64\site\lib\AnyEvent\Util.pm at line 459 call :close > ($_) > src\perl64\site\lib\AnyEvent\Util.pm at line 725 call :close > ($_) > src\perl32\site\lib\AnyEvent\Handle.pm at line 2070 call :write > ($self->{tls}, $self->{_tls_wbuf}) > > For the details, please refer to following reporting: > > > > Do you have any solution to fix these security issues ? It is very > urgent for us to fix these issues for our project, could you take it as
Show quoted text
> high priority ? > Thanks in advance ! > > Best Regards, > Jun Hua Bie > Senior IT Specialist > Global Technical Service > IBM Service > Mobile: +86-138-2370-2390 > mailto:biejunh@cn.ibm.com >
This is the Win32API::File queue, and you've reported issues with Anyevent. Also note that the Anyevent author doesn't use rt as a bug tracker: https://urldefense.proofpoint.com/v2/url?u=https-3A__metacpan.org_pod_AnyEvent-23SUPPORT&d=DwIDaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=4MLB-6domc4LM1xvz-t0YzG0kMlwZLc4B-aLJcWPH4o&m=JToT6u8s5fQWWH6hecx_zNQOL8eEm-TkOprgQd7KBm4&s=TxCrtqvjFkq8K12MN9o8WIwKemCJsYQFgTDv_ihoA6Y&e= https://urldefense.proofpoint.com/v2/url?u=https-3A__rt.cpan.org_Ticket_Display.html-3Fid-3D124723-23txn-2D1775673&d=DwIDaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=4MLB-6domc4LM1xvz-t0YzG0kMlwZLc4B-aLJcWPH4o&m=JToT6u8s5fQWWH6hecx_zNQOL8eEm-TkOprgQd7KBm4&s=SzSSlaEUNo3lLzufUB_L5eSeYhHabSxB3ff9vmSVE6g&e= Context: https://urldefense.proofpoint.com/v2/url?u=https-3A__rt.cpan.org_Ticket_Display.html-3Fid-3D130688&d=DwIDaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=4MLB-6domc4LM1xvz-t0YzG0kMlwZLc4B-aLJcWPH4o&m=JToT6u8s5fQWWH6hecx_zNQOL8eEm-TkOprgQd7KBm4&s=bwDjB4VREKMU5eEoxadaoFHjFGYH-ivZJofn6pxYVj4&e=
Subject: Re: [rt.cpan.org #130693] security vulnerabilities discovered on Win32API::File modules
Date: Thu, 17 Oct 2019 12:35:27 +0000
To: bug-Win32API-File [...] rt.cpan.org
From: "Jun Hua Bie" <biejunh [...] cn.ibm.com>

Message body is not shown because it is too large.

Message body is not shown because it is too large.

Download (untitled)
image/gif 9.6k
(untitled)