-
Notifications
You must be signed in to change notification settings - Fork 534
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: Update SSC compromise catalog #1275
Conversation
✅ Deploy Preview for tag-security ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
ca169f5
to
93efd39
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the changes! Let's see if we can get the categorization notes resolved before merging.
@@ -1,5 +1,7 @@ | |||
# Free Software Foundation Website Hack | |||
|
|||
**Note:** Review if this incident can be categorized as supply chain incident as per [compromise definitions](../compromise-definitions.md) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks like it was categorized as a supply chain attack because the compromise happened at the source code
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reading the referenced doc at https://www.computerworld.com/article/1439287/free-software-foundation-s-software-repository-hacked.html
I see original entrypoint for attacker was SQL Injection. Subsequently they extracted credentials from the database through SQL injection, uploaded a PHP reverse shell and gained access to the server that contains the source code for the website. There doesn't seem to be any evidence that this source code is in turn consumed by any other party. This seems like a first party attack without any impact to a third party.
If we still have to retain this, I feel we should change the classification type to Attack Chaining
because a multi-step attack was performed to gain access to the server and deface the website.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Re-categorizing this as Attack Chaining makes sense to me
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mnm678 Updated the category. Over to you.
93efd39
to
5df3ac1
Compare
c5ac3b5
to
ce7adf2
Compare
fix: Linter errors docs: Add reference to apt vulnerability description Signed-off-by: abhisek <[email protected]>
Signed-off-by: abhisek <[email protected]>
ce7adf2
to
7a1993f
Compare
This is first in a (expected) series of PRs to update the supply chain compromises catalog.