TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Mozilla VPN: CVE-2023-4104: vpndaemon wrongly implements Polkit authentication

262 pointsby rktaalmost 2 years ago

10 comments

p-e-walmost 2 years ago
&gt; We publish this report today, because the maximum embargo period of 90 days we offer has been exceeded. Most of the issues mentioned in this report are currently not addressed by upstream, as is outlined in more detail below.<p>&gt; [...]<p>&gt; 2023-05-04: We privately shared the findings with security@...illa.org, offering coordinated disclosure according to the openSUSE disclosure policy.<p>&gt; Until 2023-06-12: There has been a lack of communication by upstream. Relevant questions about the disclosure process remained unanswered, there was no formal reply to our report and no wishes have been expressed about how to continue the coordinated disclosure, or what the next steps would be.<p>&gt; 2023-06-12: We learned that the embargo over this issue was violated by upstream via a GitHub PR [3] and, inspired by that, our community packager followed suit via another GitHub PR [5].<p>What a complete clusterfuck. It&#x27;s unbelievable that in 2023, a company of Mozilla&#x27;s stature appears to have no proper processes in place for handling serious security vulnerabilities even when they are being reported to them (for free!) by cooperative third parties.<p>This taints the image of the entire product in my view.
评论 #36997882 未加载
评论 #36998534 未加载
评论 #36997748 未加载
评论 #37002595 未加载
Aachenalmost 2 years ago
Impact: local users on the system, including dummy service users like &#x27;nobody&#x27;, can perform actions on a running Mozilla VPN daemon via D-Bus, including activating the VPN with a server of the attacker&#x27;s choice, deactivating the VPN, obtaining log files to see when the user historically activated the VPN, and clearing log files<p>So you need to have a local shell on the system of the user you want to attack. Not cool, it violates permission boundaries that are there for a reason, but the headline sounded to me like a remote authentication bypass (I&#x27;m not into the whole D-Bus&#x2F;Polkit thing) which this is not
评论 #36998208 未加载
评论 #36998177 未加载
Barrin92almost 2 years ago
&gt;an openSUSE community packager wanted to add the Mozilla VPN client [1] to openSUSE Tumbleweed, which required a review [2] by the SUSE security team, as it contains a privileged D-Bus service running as root and a Polkit policy.<p>and this is why I tell everyone who wants to run a rolling release distro to go with Opensuse rather than distros where people just install random packages from community repositories. They are so underrated given the scrutiny they put into their packaging and build process.
alrlroipspalmost 2 years ago
The summary seems to ignore upstream.<p>They did infact<p>removed polkit : <a href="https:&#x2F;&#x2F;github.com&#x2F;mozilla-mobile&#x2F;mozilla-vpn-client&#x2F;pull&#x2F;7055">https:&#x2F;&#x2F;github.com&#x2F;mozilla-mobile&#x2F;mozilla-vpn-client&#x2F;pull&#x2F;70...</a><p>refactor auth using D-Bus: <a href="https:&#x2F;&#x2F;github.com&#x2F;mozilla-mobile&#x2F;mozilla-vpn-client&#x2F;pull&#x2F;7110">https:&#x2F;&#x2F;github.com&#x2F;mozilla-mobile&#x2F;mozilla-vpn-client&#x2F;pull&#x2F;71...</a><p>These are why author&#x27;s PR was dropped.
WhyNotHugoalmost 2 years ago
These are some nasty implementation bugs, but honestly, there are some way more serious design issues at hand here.<p>A user-configured VPN should not run as root and affect networking for the entire system; the whole VPN process should run in its own network namespace with no more privileges beyond those of the user activating it. Processes that need to use the VPN (rather than clearnet) should be attached to that same network namespace. If necessary, you can even avoid attaching a NAT (e.g.: slirp4netns) to the namespace so that if the VPN dies there is no data leakage.<p>I get that running things as root has a bit more performance, but compromising on security for the sake of performance doesn&#x27;t sound like the right approach for this kind of software.
评论 #36999972 未加载
评论 #37008134 未加载
评论 #37004549 未加载
评论 #36999046 未加载
Vogtinatoralmost 2 years ago
Looks like another case of a vulnerability which was handled poorly by upstream: Bad&#x2F;insufficient communication and multiple embargo violations.<p>Ultimately this means there is no fix available yet and no ETA when there will be one.
insanitybitalmost 2 years ago
A major action item here from Mozilla would be to bring this VPN under the same policies and teams that manage Firefox&#x27;s security issues - or standardize the policies across the company and ensure products are staffed for it (if there is a reason to avoid centralizing that to the team). I would never expect such poor handling from a browser vendor.
veavealmost 2 years ago
In case you needed any more excuses to switch to using mullvad directly.
评论 #37005762 未加载
TylerEalmost 2 years ago
NB: &lt; on Linux &gt;
评论 #36998877 未加载
评论 #36997949 未加载
NoZebra120vClipalmost 2 years ago
&quot;Open&quot; is a great marketing term to signify to geeks that you&#x27;re hip to the whole movement thing, and &quot;Wall&quot; of course is a classic Cybersecurity term that is an instantly recognizable part of &quot;firewall&quot;, but when you make a portmanteau into &quot;OpenWall&quot; and a big gaping security hole is revealed, surely the irony is not lost on us.
评论 #37004909 未加载
评论 #37002916 未加载