-
Notifications
You must be signed in to change notification settings - Fork 541
Open
Description
Summary
The automated Linux setup script retrieves libtinfo5 via wget http://security.ubuntu.com/... and immediately installs it with sudo apt install ./libtinfo5.... The download is plaintext HTTP with no checksum or signature verification, enabling code execution as root via MITM or DNS poisoning.
STR
- Run
node -e "require('./npm_modules/cli/dist/setup/linuxSetup').linuxSetup()"(or inspect the TypeScript source) to see the commands at lines 16‑19. - Place the developer on an untrusted network and ARP-spoof
security.ubuntu.com, serving a malicious .deb. - When the script runs, the forged package is installed with root privileges, giving the attacker persistence on every developer workstation.
Remediation
Drop manual HTTP downloads. Install libtinfo5 from the official HTTPS apt repository (which enforces GPG signatures), or download over HTTPS and verify a published checksum/signature before calling sudo apt install.
Impact
Compromised developer machines become a launchpad for supply-chain attacks against Valdi and any consumer of the framework. Root-level compromise also exposes credentials, signing keys, and unreleased code.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels