|
|
Subscribe / Log in / New account

GitHub comments used to distribute malware (BleepingComputer)

GitHub comments used to distribute malware (BleepingComputer)

Posted Apr 24, 2024 16:26 UTC (Wed) by rrolls (subscriber, #151126)
Parent article: GitHub comments used to distribute malware (BleepingComputer)

A wonderful example of an inventive exploit and an unintended loophole.

> The URLs for the malware installers [would appear like, for example:]
> https://github[.]com/microsoft/vcpkg/files/14125503/Cheat.Lab.2.7.2.zip

I think the "right" solution here would be to change `/microsoft/vcpkg/` to `/comments/username_of_comment_author/`, or something like that.

It's `username_of_comment_author` who controls that content, so the URL should make that clear, and not associate it with a well-known entity that isn't responsible for it.

Though, I imagine they'll have a tricky time actually implementing such a change...


to post comments

GitHub comments used to distribute malware (BleepingComputer)

Posted Apr 24, 2024 16:31 UTC (Wed) by josh (subscriber, #17465) [Link] (1 responses)

> I think the "right" solution here would be to change `/microsoft/vcpkg/` to `/comments/username_of_comment_author/`, or something like that.

This seems like the right answer, yeah.

This rhymes with a previous exploit of this type: if you made a PR against a repository, you could link to files via that repository and your commit hash, and they'd look like they were part of the repository. GitHub's fix was to show a banner saying they weren't part of the repository.

GitHub comments used to distribute malware (BleepingComputer)

Posted Apr 25, 2024 15:42 UTC (Thu) by wtarreau (subscriber, #51152) [Link]

Yeah I totally agree, and it's way better than my suggestion of a hash!

GitHub comments used to distribute malware (BleepingComputer)

Posted Apr 25, 2024 19:52 UTC (Thu) by srdjant (guest, #171146) [Link]

What is interesting, is that this is the same git repo that was mentioned in another LWN article's comments (https://lwn.net/Articles/967866/) regarding the actions of a specific user that was (probably innocently) suspected of being involved with the XZ attack, because of their actions (being pushy about updating a version to the vulnerable xz version) in an issue for that repo.

I would say it's probably just a random co-incidence, but I am not surprised that devs and maintainers are now looking carefully at their own, and other important projects for signs of attack (e.g. the ZSH Plugin Manager video from 8 days ago).

GitHub comments used to distribute malware (BleepingComputer)

Posted Apr 29, 2024 7:28 UTC (Mon) by eduperez (guest, #11232) [Link]

Yes, it makes sense that the files associated with a comment appear as belonging to the owner of the comment, not the owner of the repo where the comment was made. Also, the files are uploaded and linked even if the comment is abandoned and never posted; another sane measure would be to delete the files if the comment is not posted or gets deleted later.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds