Uploaded image for project: 'Policy Framework'
  1. Policy Framework
  2. POLICY-1509

Investigate Apex org.python.jython-standalone.2.7.1

    XMLWordPrintable

Details

    • Task
    • Status: Closed
    • Medium
    • Resolution: Done
    • None
    • None
    • None

    Description

      Per security subcommitte, request JIRA's for false positives.

      This dependency brings in the Jython (Python) interpreter for executing scripts written in Python under the control of Apex.

      There are two vulnerabilities, both concerning adding extra modules to the Python libraries on a host running Python scripts under Jython.

      • The setup.py and build_py.py files allow extra python packages to be installed on the host during the startup of Jython. This mechanism uses the setuptools mechanism to install those packages. That mechanism does not enforce path traversal restrictions, allowing malicious packages to access protected areas on the host.
      • Jython uses packages installed with the python pip utility. Pip is vulnerable to Path Traversal attacks, malicious packages installed with pip can access protected areas on the host

      The solution is to warn developers not to install malicious extra Python packages.

      Attachments

        Issue Links

          # Subject Branch Project Status CR V

          Activity

            People

              Unassigned Unassigned
              pdragosh Pamela Dragosh
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: