Skip to content

Linux Dev Setup Downloads Unsigned Packages Over HTTP #19

@geeknik

Description

@geeknik

Summary

The automated Linux setup script retrieves libtinfo5 via wget http://security.ubuntu.com/... and immediately installs it with sudo apt install ./libtinfo5.... The download is plaintext HTTP with no checksum or signature verification, enabling code execution as root via MITM or DNS poisoning.

STR

  1. Run node -e "require('./npm_modules/cli/dist/setup/linuxSetup').linuxSetup()" (or inspect the TypeScript source) to see the commands at lines 16‑19.
  2. Place the developer on an untrusted network and ARP-spoof security.ubuntu.com, serving a malicious .deb.
  3. When the script runs, the forged package is installed with root privileges, giving the attacker persistence on every developer workstation.

Remediation

Drop manual HTTP downloads. Install libtinfo5 from the official HTTPS apt repository (which enforces GPG signatures), or download over HTTPS and verify a published checksum/signature before calling sudo apt install.

Impact

Compromised developer machines become a launchpad for supply-chain attacks against Valdi and any consumer of the framework. Root-level compromise also exposes credentials, signing keys, and unreleased code.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions