Carrot Disclosure: Forgejo

(dustri.org)

138 points | by bo0tzz 2 days ago ago

51 comments

  • jorams 2 days ago ago

    This is a weird post to be honest. You've found a whole bunch of serious security issues, filed two PRs, one of which is adding some quotes because

    > Those aren't exploitable XSS, but it doesn't hurt to have a second layer of defense.

    The other suggests breaking clients that aren't using the more secure version of an OAuth method because

    > I can't think of any OAuth client that would like to [use it]

    That second one is a good idea, but the maintainer is also right to ask for some discussion before introducing a breaking change.

    But crucially: neither of these are the kind of significant security issues you've found. Maybe lead with an actual bug?

    • bogwog 2 days ago ago

      And attempting to publicly shame them into accepting a PR. Kinda reminds me of https://en.wikipedia.org/wiki/XZ_Utils_backdoor

    • PunchyHamster 2 days ago ago

      > That second one is a good idea, but the maintainer is also right to ask for some discussion before introducing a breaking change.

      The discussion seems to be already happening https://codeberg.org/forgejo/forgejo/issues/8634, author of the blog just did drive-by PR rather than looking at issue tracker

      It's very much "I know better, do what I told you despise not thinking a second about any second order effects the change might cause" attitude that is so common with security people

      • henryteeare 2 days ago ago

        I believe the discussion in #8634 is for a different change, but one of a similar nature.

        • embedding-shape a day ago ago

          It's not, the maintainer has pointed to that discussion multiple times to the author of the submission, saying they need to resolve that before they can just straight up deprecate authentication methods without any alternatives available to users currently using it.

          • johnmaguire a day ago ago

            I'm really confused by this interpretation. I see a single comment by the maintainer, saying:

            > That mistake was made in the past (#8634), where there was still a lot of usages of a old and announced deprecated method (and even with quite some effort there is).

            It was a related, but separate issue, which is perhaps best-described in this upstream issue: https://github.com/python-social-auth/social-core/issues/121...

            The "plain" setting jvoison wants to remove is described here: https://security.stackexchange.com/a/218554

            I do agree with the maintainer that a discussion is warranted before removing this setting. But I also wouldn't personally have closed the PR while waiting for said discussion to occur - and the maintainer could have created a discussion themselves. They are signaling they don't want this change, full stop.

      • unethical_ban 2 days ago ago

        Yeah, ITOps and software teams are totally aware of the second order effects of their shitty software and compliance failures, security are always the wrong ones.

    • arcfour 2 days ago ago

      Closing the PR without providing feedback beyond "needs further discussion" does not engender said further discussion.

      • PunchyHamster 2 days ago ago

        PR isn't a place for discussion about what or how to implement change in the first place, that should be forum/mailing list/issues

        and there is open issue for that discussion https://codeberg.org/forgejo/forgejo/issues/8634

        • johnmaguire a day ago ago

          #8634 is specifically about a breaking change that occurred in v12. It's literally the first line of what you linked:

          > In the v12 release of Forgejo (fixed in v12.0.1) there have been breaking changes that impact third-party authentication sources that use Forgejo as a provider. If you have been affected, please help us assessing the impact ...

      • henryteeare 2 days ago ago

        The response was, "needs a discussion," as in a post on `https://codeberg.org/forgejo/discussions`, rather than directly creating a PR.

        There also was feedback saying approximately that they've been burned by security changes in the recent past and don't want to run into similar issues without due consideration.

  • preinheimer 2 days ago ago

    There’s an old cryptography story.

    A cryptographer friend tells the story of an amateur who kept bothering him with the cipher he invented. The cryptographer would break the cipher, the amateur would make a change to “fix” it, and the cryptographer would break it again. This exchange went on a few times until the cryptographer became fed up. When the amateur visited him to hear what the cryptographer thought, the cryptographer put three envelopes face down on the table. “In each of these envelopes is an attack against your cipher. Take one and read it. Don’t come back until you’ve discovered the other two attacks.” The amateur was never heard from again.

    https://www.schneier.com/crypto-gram/archives/1998/1015.html

    • reverius42 10 hours ago ago

      And who in the OP's post is the cryptographer, and who's the amateur, in this allegory?

    • neilv 2 days ago ago

      And if you are a dishonest cryptographer, you only need to find one attack to pull this off.

  • isodev 2 days ago ago

    This entire post reads as rage bait. They’re mad because Forgejo has … a process? And what are these vulnerabilities, concretely?

    > But given the sorry state of the codebase

    I honesty want a refund on the 10 minutes I wasted reading this.

  • jeremiahlee a day ago ago

    The author sent 5 more pull requests fixing (tragically) fundamental security flaws. https://codeberg.org/forgejo/forgejo/pulls?q=&type=all&sort=...

  • flumpcakes 2 days ago ago

    Did the author actually disclose this RCE or just open random PRs and claim there's an issue?

    It doesn't appear like the author is acting in good faith, instead grandstanding in public because they feel superior.

    • apublicfrog 2 days ago ago

      The author quite clearly outlines their reasoning for this in the article:

      > Carrot Disclosure, dangling a metaphorical carrot in front of the vendor to incentivise change. The main idea is to only publish the (redacted) output of the exploit for a critical vulnerability, to showcase that the software is exploitable. Now the vendor has two choices: either perform a holistic audit of its software, fixing as many issues as possible in the hope of fixing the showcased vulnerability; or losing users who might not be happy running a known-vulnerable software. Users of this disclosure model are of course called Bugs Bunnies.

      • flumpcakes a day ago ago

        Seems like grandstanding bad faith to me. They didn't even bother to follow the established disclosure policy for this project because the author feels this quality of the code is so crap, so instead does this...

  • pabs3 a day ago ago

    I note that the code that pull request 12283 is changing builds HTML via string concatenation/templates, which is a widespread source of XSS problems. Maybe it is time to for browsers and JavaScript runtimes/libraries to deprecate string based HTML building and require DOM based instead. The former is unsafe by design and the latter is a safe-by-construction approach.

    Getting HTML building right is a pretty basic building block of web apps, Forgejo can't have great security practices if they aren't doing that. So I can easily imagine the OP is correct in their assessment of Forgejo code security.

  • gchamonlive 2 days ago ago

    In the age of AI, carrot disclosure is potentially a full disclosure with extra steps. I'm no security expert, but with the context provided, the forgejo codebase and the outline of the redacted script, I think there is a good chance I could use codex to crunch through the vuln chain and reproduce the script.

    • nine_k 2 days ago ago

      Where's the vuln chain? Is it even obvious which APIs have been called?

      • gchamonlive a day ago ago

        --- In this session we are going to explore the vulnerabilities documented in this carrot disclosure post at https://dustri.org/b/carrot-disclosure-forgejo.html and try to reproduce the script that explores the chain to gain admin access to forgego.

        The post mentions just briefly what's been used to create the vuln chain: `SSRF in a lot of places, no CSP/Trusted-Types, a bit of ghetto templating in javascript, cryptographic malpractices, overlooks in the authentication mechanisms (OAuth2, OTP, sessions/access handling, post-compromission recovery, …), a bunch of low-hanging DoS, information leak all over the place, various TOCTOU, … All in all, it took me one evening after work to find a good amount of vulnerabilities (adding to the one I got from looking at gitea at some point in the past), and chain some of them to obtain a full-blown RCE`.

        There is also the outline of the script call and the output we will use to base the script reproduction:

        ``` $ python3 ./chain_alpha.py --target http://127.0.0.1:3000 > out.txt $ grep Backdoor out.txt [+] Backdoor admin created: svc_ljeopgid / dukecepapsygiqks!A1 $ tail -n17 out.txt

        ================================================================ [+] COMMAND EXECUTION CONFIRMED! ================================================================

        Server-side hook output (received via git push stderr):

          remote: ==========================================
          remote: FORGEJO RCE PoC - Command Execution Proof
          remote: ==========================================
          remote: hostname: chernabog
          remote: uid:      uid=1000(jvoisin) gid=1000(jvoisin) groups=1000(jvoisin),10(wheel) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
          remote: date:     Tue Apr 28 19:16:59 UTC 2026
          remote: proof:    chernabog
          remote: ==========================================
        
        ================================================================ $ sha256 ./chain_alpha.py c10d28a5ff74646683953874b035ca6ba56742db2f95198b54e561523e1880d7 ./poc/chain_alpha.py jvoisin@chernabog 11:35 ~/Documents/exploits/forgejo tree . ├── chain_alpha.py ├── chain_beta.py ├── chain_gamma.py ├── dos │ ├── cpuburn_authenticated.py │ ├── cpu_dos.py │ ├── dbburn.py │ ├── dfburn.py │ ├── exhaust.py │ ├── gburn.py │ ├── grpstarve.py │ ├── rstarve.py │ ├── starve.py │ └── storage.py ├── f9_repo_settings.py ├── get_version.py ├── leak_secrets.py ├── leak_token.py ├── merge.py └── NOTES.md

        2 directories, 19 files $ ```

        Our working directory already contains the source for forgego.

        I am no security expert so we will need to approach this in four stages:

        First I need you to guide me through each of the vuln concepts exposed in the article. In this step I am going to read through them and understand each of them.

        I am also not familiar with forgego codebase, so in the second step I need you to guide me through the code, as we explore and understand the architecture and implementation of this git platform.

        In the third stage we are going to validate my understanding of the first stage by linking each of the concept with the actual codebase.

        Finally, in the fourth stage we are most likely prepared to tackle reproducing the vuln chain exploit.

        Create one work item for each step. We are going to go through each of them in separate sessions.

  • throwaway38294 2 days ago ago

    I run a forgejo instance at home but wouldn't dream of opening it up to the public. Works great, and fast on lan, but imo keep it there

  • 000ooo000 2 days ago ago

    Hopefully someone a little more.. pragmatic gets eyes on that linked PR.

  • mmsc 2 days ago ago

    https://codeberg.org/forgejo/governance/src/commit/5c07b3801...

    > Failure to comply with these rules will be criticized publicly, and we reserve the right to no longer coordinate with you or your project in the future.

    lol

  • kasdklasmdads 2 days ago ago

    Imagine if every open source contributor behaved like that.

    "I found performance problems in your software, but I won't disclose them until you fix them."

    "I'm a designer, but I won't disclose my improvement to your project until you adjust all the CSS bugs in your project."

    If that person is skilled with finding security bugs, then that could be their contribution to that open-source project, like any other contribution.

  • gbraad 2 days ago ago

    This is so wrong. Because he didn't like a PR removing a feature, and they haven't yet merged another PR that was opened yesterday?!?

  • unethical_ban 2 days ago ago

    From a linked PR (related to this RCE?), from a maintainer who closed it:

    >Just thinking something not being used is not enough, even if it's a security sensitive topic

    Linux kernel seems to disagree. This is a dangerously naive way to think of networked software in the AI age.

    ---

    edit: I got hit with the "posting too fast" block again, so I'll reply to dangus here:

    >While a remote host would further prove the claim, the person clearly claims it is RCE, not just CE. It would be quite the pie in the face if the author wrote a python script to take in an IP address but modified system files on the backend to create a stunt.

    • dangus 2 days ago ago

      It would definitely be a bit silly for the author to make a fake carrot disclosure, but I thought of it just because of how reading this article made me feel distrust toward the author. IDK, they just seem like kind of a jerk!

      Now, I don't think the PRs with the Forgejo folks show a lot of warm collaborative energy on their side, either, but I can see how soft skills from the author would likely have taken their PRs a lot further in getting what they want.

      But the author's whole attitude is that Forejo is such a mess and it's barely worth their time to try and clean it up. Nobody's twisting their arm to contribute to an open source project that they don't even like!

      From the perspective of Forgejo maintainers, the author is just some random new contributor barging in and telling them to drop some legacy support that hasn't been discussed in detail yet. And of course, this new contributor hasn't actually followed the security policy to disclose it as a high severity issue to justify the change.

      • JuniperMesos 2 days ago ago

        > But the author's whole attitude is that Forejo is such a mess and it's barely worth their time to try and clean it up. Nobody's twisting their arm to contribute to an open source project that they don't even like!

        > From the perspective of Forgejo maintainers, the author is just some random new contributor barging in and telling them to drop some legacy support that hasn't been discussed in detail yet. And of course, this new contributor hasn't actually followed the security policy to disclose it as a high severity issue to justify the change.

        It does affect my own willingness to use Forgejo, as a current non-user. It sounds like it has some security vulnerabilities that the maintainers aren't taking seriously, perhaps because they think the people who report those vulnerabilities are jerks. Are the Forgejo maintainers themselves sure that their software isn't going to get pwned in a way they don't have the right techniques to mitigate? I'd rather know that before I run it on my own infra.

        • jorams 2 days ago ago

          > It sounds like it has some security vulnerabilities that the maintainers aren't taking seriously

          It may, and they may or may not, but the author hasn't actually reported any. They're explicitly ignoring the security policy and vagueposting instead.

        • dangus 2 days ago ago

          The author of this blog post essentially never reported the exploit to the Forgejo maintainers. They merely submitted a security-related PR.

          The maintainers aren't mind readers. They have never been directly informed that a proven exploit exists, and the author of the article actively ignored the project's reporting process despite being aware of it.

          And it's not a particularly complicated report process. You literally just email them.

      • chillfox 2 days ago ago

        Don’t forget, repeatedly ignoring the requirements for including tests, and instead offering up a “have tested it locally, trust me” as a substitute.

        • conartist6 2 days ago ago

          The worry here is that they need to leave the security hole open because they're using it?

      • conartist6 2 days ago ago

        Idunno, I think this model of disclosure feels more natural to me. The "coordinated" model can have the smack of extortion to it.

        And yes, I very much want there to exist people whose specialty is finding security bugs. I wouldn't expect such a person to be a diehard contributor to any particular project. Their motivation isn't making one tool better, but keeping users safe. We need those people and the work they do badly!

  • dangus 2 days ago ago

    The author's attitude is so off-putting. What gives? Did Forgejo hurt you?

    The Forgejo disclosure process looked pretty simple and straightforward to me. The bold and all-caps words that bothered the author are just making sure you know how to disclose vulnerabilities safely without leaking zero-day exploits to a wider audience than necessary.

    I'm also not impressed with a carrot disclosure that looks like this. Running a python script to compromise a locally hosted instance? Bruh, you have physical hardware and host shell access. That python script could be doing anything including running as root.

    Show us the exploit hitting a remote server.

    • shimman 2 days ago ago

      Seriously, this author comes across as an absolute sore loser if this is the PR they are referring too:

      https://codeberg.org/forgejo/forgejo/pulls/12283

      Someone asking you to write a test for new code and then making this blog in response is just so pathetic.

      • martey 2 days ago ago

        While I agree with you that this blog post (and the "carrot disclosure" described in it) is ill-considered, the pull request is not really "new code", it adds quotes to HTML attributes that are missing them. I think it's entirely reasonable for a contributor to assume that a new test case would not be needed for this small change, and that the maintainer's response ("So a simple question: is this code covered under a test? If not, you will have to add one.") is more abrasive than necessary.

        • preisschild a day ago ago

          a test is probably not the right thing for this, but adding a linting rule so that quoting is enforced everywhere is probably the right way to go

      • onedognight 2 days ago ago

        To hell with writing a test for you. That’s what you say to someone who gets paid by you. If the project doesn’t want the fix. That’s their issue, not the reporter’s.

        • akoboldfrying 2 days ago ago

          Look at the big picture. The maintainers likely deal with many low-quality bug reports and PRs coming in, especially from AI, and the incentive to spam these is not going away anytime soon. How should they best allocate their limited attention?

          One way is for the PR maker to signal their own attention to detail/effort/commitment by jumping through the (quite reasonable) hoop of writing a test.

          Is this extra effort? Yes. But if your motivation in opening the PR in the first place is genuinely to improve the world, then do the slightly harder thing that actually improves the world given the constraints on maintainer attention it operates under, not the thing that is slightly easier for you but leaves your contribution indistinguishable from the sea of slop out there.

      • Chris2048 2 days ago ago

        > Someone asking you to write a test for new code

        per the response: "I'm not sure what kind of test would you like me to write for this change, as it's simply adding 4 quotes"

        • kstrauser 2 days ago ago

          Maybe one showing that the change doesn't make it worse. Here's the code change:

            - <a class="item muted sidebar-item-link" href=${$(this).data('href')}>
            + <a class="item muted sidebar-item-link" href="${$(this).data('href')}">
          
          I know zero about this code path, but suppose it's expected that `${$(this).data('href')}` is already a properly quoted value, like `"https://example.com"`. Then the first line expands to:

            <a class="item muted sidebar-item-link" href="https://example.com">
          
          and the second expands to:

            <a class="item muted sidebar-item-link" href=""https://example.com"">
          
          which would have all kinds of room for mischief. Or suppose the template engine auto-quotes values that it injects, so the quotes aren't necessary at all, which is a pretty common approach. The point is that you don't randomly want to throw quotes into HTML or single quotes into SQL just for giggles. You have to write tests demonstrating that the existing common use cases still work after the change, even if it's simply adding 4 quotes.
          • MajesticHobo2 2 days ago ago

            I'd say also add a test that shows the HTML injection (which spurred the PR) isn't possible. Given an attacker-controlled URL of:

                foo onclick
            
            the following shouldn't render:

                <a class="item muted sidebar-item-link" href=foo onclick>
            
            The following should:

                <a class="item muted sidebar-item-link" href="foo onclick">
            • kstrauser 2 days ago ago

              Oh, for sure! That'd end the conversation: "your change breaks the existing tests. Fix that and we'll re-consider."

          • pabs3 a day ago ago

            I wonder why they didn't change it to use DOM APIs instead. Related comment:

            https://news.ycombinator.com/item?id=47945472

            • kstrauser a day ago ago

              Not sure. Are those APIs widely supported now? This is far outside my expertise and I don't know the current state of the art.

        • shimman 2 days ago ago

          That totally justifies the very normal extortion like blog post in response.

    • quectophoton 2 days ago ago

      > I'm also not impressed with a carrot disclosure that looks like this. Running a python script to compromise a locally hosted instance? Bruh, you have physical hardware and host shell access. That python script could be doing anything including running as root.

      > Show us the exploit hitting a remote server.

      Watch out, their script works on HN too, as a proof here's me logging in to YOUR computer's root account (a bit more redacted for obvious reasons):

          $ python3 ./poc/chain_alpha.py --target dangus > out.txt
          $ grep Backdoor out.txt |  sed -r 's@[^:]+$@ [REDACTED]@g'
          [+]   Backdoor admin created: [REDACTED]
          $ grep IP out.txt |  sed -r 's@[^:]+$@ [REDACTED]@g'
          [+]   IPv4 address for dangus: [REDACTED]
          $ grep 'debug2: shell' out.txt
          [+]   debug2: shell request accepted on channel 0
          $ tail -n12 out.txt 
          ================================================================
          [+] COMMAND EXECUTION CONFIRMED!
          ================================================================
          
          Server-side output (received via SSH, with `set -x`):
      
            + id -u
            0
            + id -g
            0
          
          ================================================================
          $ sha256 ./poc/chain_alpha.py
          c10d28a5ff74646683953874b035ca6ba56742db2f95198b54e561523e1880d7  ./poc/chain_alpha.py