ibgitlab-api-v4-perl: CVE-2023-31485

Related Vulnerabilities: CVE-2023-31485  

Debian Bug report logs - #954051
ibgitlab-api-v4-perl: CVE-2023-31485

Reported by: Felix Lechner <felix.lechner@lease-up.com>

Date: Mon, 16 Mar 2020 02:45:02 UTC

Severity: important

Tags: security, upstream

Forwarded to https://github.com/bluefeet/GitLab-API-v4/pull/57

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Perl Group <pkg-perl-maintainers@lists.alioth.debian.org>:
Bug#954051; Package libgitlab-api-v4-perl. (Mon, 16 Mar 2020 02:45:04 GMT) (full text, mbox, link).


Acknowledgement sent to Felix Lechner <felix.lechner@lease-up.com>:
New Bug report received and forwarded. Copy sent to Debian Perl Group <pkg-perl-maintainers@lists.alioth.debian.org>. (Mon, 16 Mar 2020 02:45:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Felix Lechner <felix.lechner@lease-up.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libgitlab-api-v4-perl: Please verify server identity via SSL
Date: Sun, 15 Mar 2020 19:43:16 -0700
Package: libgitlab-api-v4-perl
Severity: important

Dear maintainer,

Your package uses the Perl module HTTP::Tiny but does not set the
verify_SSL attribute to a true value.

By default, that module does not validate the identity of server
certificates. The documentation states that "Server identity
verification is controversial and potentially tricky..." [1]

As late as 2015, upstream has been doubling up: "we're not going to be
responsible for the user's trust model" [2]

I believe, on the other hand, that the encryption of a transmission
has no value when talking to the wrong person. You can easily see the
useless and dangerous default by running the script at the end of this
message.

Will you please turn on the verify_SSL attribute in HTTP::Tiny?

Kind regards
Felix Lechner

[1] https://metacpan.org/pod/HTTP::Tiny#SSL-SUPPORT
[2] https://github.com/chansen/p5-http-tiny/issues/68

* * *

#!/usr/bin/perl

use HTTP::Tiny;

my $response = HTTP::Tiny->new->get('https://self-signed.badssl.com/');
 die "Failed!\n"
    unless $response->{success};

print "$response->{status} $response->{reason}\n";

while (my ($k, $v) = each %{$response->{headers}}) {
    for (ref $v eq 'ARRAY' ? @$v : $v) {
        print "$k: $_\n";
    }
}

print $response->{content}
    if length $response->{content};



Changed Bug title to 'ibgitlab-api-v4-perl: CVE-2023-31485' from 'libgitlab-api-v4-perl: Please verify server identity via SSL'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 29 Apr 2023 13:51:03 GMT) (full text, mbox, link).


Set Bug forwarded-to-address to 'https://github.com/bluefeet/GitLab-API-v4/pull/57'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 29 Apr 2023 13:51:03 GMT) (full text, mbox, link).


Added tag(s) security and upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 29 Apr 2023 18:51:09 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Apr 30 13:12:26 2023; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.