Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Unpatched Supply-Chain Flaw Affects ‘Pling Store’ Platforms for Linux Users

pling store linuxpling store linux

Cybersecurity researchers have disclosed a critical unpatched
vulnerability affecting Pling-based free and open-source software
(FOSS) marketplaces for Linux platform that could be potentially
abused to stage supply chain attacks and achieve remote code
execution (RCE).

“Linux marketplaces that are based on the Pling platform are
vulnerable to a wormable [cross-site scripting] with potential for
a supply chain attack,” Positive Security co-founder Fabian
Bräunlein said[1]
in a technical write-up published today. “The native PlingStore
application is affected by an RCE vulnerability, which can be
triggered from any website while the app is running.”

Stack Overflow Teams

The Pling-based app stores impacted by the flaw include —

  • appimagehub.com
  • store.kde.org
  • gnome-look.org
  • xfce-look.org
  • pling.com

PlingStore allows users to search and install Linux software,
themes, icons, and other add-ons that may not be available for
download through the distribution’s software center.

The vulnerability stems from the manner the store’s product
listings page parses HTML or embedded media fields, thereby
potentially allowing an attacker to inject malicious JavaScript
code that could result in arbitrary code execution.

pling store linuxpling store linux

“This stored XSS[2]
could be used to modify active listings, or post new listings on
the Pling store in the context of other users, resulting in a
wormable XSS,” Bräunlein said.

More troublingly, this could allow for a supply-chain attack XSS
worm wherein a JavaScript payload could be exploited by an
adversary to upload trojanized versions of software and tweak the
metadata of a victim’s listing to include and propagate the attack
code.

With the PlingStore app acting as a single digital storefront
for all the aforementioned app stores, Positive Security noted that
the XSS exploit can be triggered from within the app that, when
coupled with a sandbox bypass, could lead to remote code
execution.

Prevent Data Breaches

“As the application can install other applications, it has
another built-in mechanism to execute code on the [operating
system] level,” Bräunlein explained. “As it turns out, that
mechanism can be exploited by any website to run arbitrary native
code while the PlingStore app is open in the background.”

Put differently, when a user visits a malicious website via the
browser, the XSS is triggered inside the Pling app while it’s
running in the background. Not only can the JavaScript code in the
website establish a connection to the local WebSocket server[3]
that’s used to listen to messages from the app, it also uses it to
send messages to execute arbitrary native code by downloading and
executing an .AppImage package file.

pling store linuxpling store linux

What’s more, a similar XSS flaw uncovered in the GNOME Shell
Extensions
[4] marketplace could be
leveraged to target the victim’s computer by issuing malicious
commands to the Gnome Shell Integration browser extension and even
backdoor published extensions.

The Berlin-based cybersecurity firm noted that the flaws were
reported to the respective project maintainers on Feb. 24, with KDE
Project and GNOME Security issuing patches[5]
for the flaws following disclosure. In light of the fact that the
RCE flaw associated with the PlingStore remains unaddressed as yet,
it’s recommended not to run the Electron application until a fix is
in place.

The report comes less than a month after severe security
weaknesses were uncovered in several popular Visual Studio Code
extensions
[6] that could enable
attackers to compromise local machines as well as build and
deployment systems through a developer’s integrated development
environment, ultimately paving the way for supply chain
attacks.

“[The flaws] demonstrate the additional risk associated with
such marketplaces,” Bräunlein said. “In this environment, even
relatively small vulnerabilities (e.g. a missing origin check) can
lead to severe consequences (drive-by RCE from any browser with the
vulnerable application running in background). Developers of such
applications must put in a high level of scrutiny to ensure their
security.”

References

  1. ^
    said
    (positive.security)
  2. ^
    stored
    XSS
    (www.imperva.com)
  3. ^
    local
    WebSocket server
    (developer.mozilla.org)
  4. ^
    GNOME Shell Extensions
    (extensions.gnome.org)
  5. ^
    issuing
    patches
    (kde.org)
  6. ^
    several
    popular Visual Studio Code extensions

    (thehackernews.com)

Read more