You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Possible CWE-117, when using the --daemon (or previous--deamon in v1.4.4-v1.5.0) with the HEAR sub-command. This affects all versions prior to v2.0.0-beta. This affects multiple modes in versions v1.4.4-v1.5.0 (identifiable by use of misspelled --deamon flag) and cascades into a CWE-180 by default.
Caution
Security can be a complex topic. Due to the very nature of low-level of the Multicast python module, there will always be the typical networking security risks related to raw inputs. Developers should assume multicast python module has the same unmitigated security impacts as raw sockets from the Python sockets module.
Fix
1. Migrate to the latest release on GitHub (e.g. v2.0.0)
Patches
Fixed for the 2.0 release series and is available as a stable release v2.0.0.
Historical
Fixed for the 2.0 release series and is available as a pre-release v2.0.0-beta.
A fix has been back-ported for the v1.5 stable release (released as v1.5.1)
:information: Additional Details
## Workarounds
1. Use of a custom handler for the `multicast.hear.McastServer` class that specifically implements the `handle` method can mitigate the issue ad-hoc.
2. private dedicated networks can drop external traffic to and multicast group in use to isolate impacted servers.
Details
Impact
Possible CWE-117, when using the
--daemon
(or previous--deamon
in v1.4.4-v1.5.0) with theHEAR
sub-command. This affects all versions prior to v2.0.0-beta. This affects multiple modes in versions v1.4.4-v1.5.0 (identifiable by use of misspelled--deamon
flag) and cascades into a CWE-180 by default.Caution
Security can be a complex topic. Due to the very nature of low-level of the Multicast python module, there will always be the typical networking security risks related to raw inputs. Developers should assume
multicast
python module has the same unmitigated security impacts as raw sockets from the Pythonsockets
module.Fix
1. Migrate to the latest release on GitHub (e.g. v2.0.0)
Patches
Fixed for the 2.0 release series and is available as a stable release v2.0.0.
Historical
:information: Additional Details
## Workarounds 1. Use of a custom handler for the `multicast.hear.McastServer` class that specifically implements the `handle` method can mitigate the issue ad-hoc. 2. private dedicated networks can drop external traffic to and multicast group in use to isolate impacted servers.References
Formal long-term fix is tracked by #147