[CRITICAL] curl | bash install script -- supply chain attack surface #20
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Problem
The README promotes
curl -fsSL https://forge.ourworld.tf/.../install.sh | bashas the primary installation method.-sflag suppresses errors,-fmakes curl fail silently on HTTP errorspkill -f "my_init_server"which uses fuzzy matching and could kill unrelated processesImpact
Supply chain attack vector. An attacker who can intercept or modify the download gains arbitrary code execution on the target machine.
Files
scripts/install.shREADME.md-- installation sectionSuggested Fix
pkill -xor PID files instead of fuzzypkill -fThe README's primary installation method (curl -fsSL https://...install.sh | bash) provides no way to verify binary integrity. If the Forgejo instance is compromised or a MitM attack occurs, this is instant code execution. Additionally, the install.sh script uses pkill -f "my_init_server" for fuzzy matching, which can kill processes with unrelated names containing that substring. Validated against scripts/install.sh.