Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Java] CRLF Injection #387

Closed
1 task done
haby0 opened this issue Jun 28, 2021 · 8 comments
Closed
1 task done

[Java] CRLF Injection #387

haby0 opened this issue Jun 28, 2021 · 8 comments
Labels
All For One Submissions to the All for One, One for All bounty

Comments

@haby0
Copy link

haby0 commented Jun 28, 2021

Query

Link to pull request with your CodeQL query:

Relevant PR: github/codeql#6173

CVE ID(s)

List the CVE ID(s) associated with this vulnerability. GitHub will automatically link CVE IDs to the GitHub Advisory Database.

  • CVE-20nn-nnnnn

Report

Describe the vulnerability. Provide any information you think will help GitHub assess the impact your query has on the open source community.

If unprocessed user input is directly added to email headers or written to logs, malicious users can carry out email or
log injection attacks.

  • Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc). We would love to have you spread the word about the good work you are doing

Result(s)

Provide at least one useful result found by your query, on some revision of a real project.

@haby0 haby0 added the All For One Submissions to the All for One, One for All bounty label Jun 28, 2021
@haby0 haby0 changed the title [Java] Crlf Injection [Java] CRLF Injection Jun 28, 2021
@pwntester
Copy link
Contributor

Hi @haby0

Thanks for the submission.

Log Injection was already contributed by:
#144
#265

How is your query different? If it adds new sinks, please add them to the existing query.

Re: Mail header injection. I was under the impression that those APIs were fixed a time ago. Can you please provide a working PoC in the form of a simple test case where we can validate that CRLF is still an issue for those APIs?

@pwntester pwntester assigned pwntester and unassigned pwntester Jul 13, 2021
@haby0
Copy link
Author

haby0 commented Jul 13, 2021

@pwntester The version of javax.mail I use is 1.5.0-b01

@pwntester
Copy link
Contributor

Is 1.6.2 secure against CRLF injection?

@haby0
Copy link
Author

haby0 commented Jul 13, 2021

Is safe

@pwntester
Copy link
Contributor

Then the issue should be reported by an SCA tool (such as dependabot) since CodeQL is not checking the version used and could result in a high number of FPs.

@pwntester
Copy link
Contributor

Im closing this issue as is. If relevant, please submit an improvement for the existing Log Injection query.

Thanks for the contribution!

@haby0
Copy link
Author

haby0 commented Jul 13, 2021

Im closing this issue as is. If relevant, please submit an improvement for the existing Log Injection query.

Thanks for the contribution!

Thank you

@ghsecuritylab
Copy link
Collaborator

Your submission is now in status Closed.

For information, the evaluation workflow is the following:
SecLab review > Generate Query Results > FP Check > CodeQL review > SecLab finalize > Pay > Closed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
All For One Submissions to the All for One, One for All bounty
Projects
None yet
Development

No branches or pull requests

3 participants