Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sparkle security vulnerability #402

Closed
JamesMcMahon opened this issue Feb 10, 2016 · 2 comments
Closed

Sparkle security vulnerability #402

JamesMcMahon opened this issue Feb 10, 2016 · 2 comments

Comments

@JamesMcMahon
Copy link

Older versions of Sparkle have a rather serious security vulnerability in it that allows a man in the middle attack to remote execute code during an update check.

All Sparkle versions older than 1.13.1 which fetch appcast or release notes over insecure HTTP connection are vulnerable to a man-in-the-middle attack that can lead to disclosure of local files or remote code execution.

Applications using Sparkle with HTTPS appcast feed URLs and HTTPS release notes links (if any) are safe.

More details at:

Only update URLs not using HTTPS are affected. I haven't tested the vulnerability with Amethyst but it looks like the app is using 1.9.0 so it would be affected by this issue (unless it's using HTTPS for updates).

@ianyh
Copy link
Owner

ianyh commented Feb 10, 2016

The Amethyst app cast is secured, but the update is valuable regardless so I'll leave this open.

@ianyh
Copy link
Owner

ianyh commented Feb 11, 2016

This actually got updated in #403

@ianyh ianyh closed this as completed Feb 11, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants