Brew bootstrap process is insecure

Disclosed: 2021-04-30 12:15:42 By nightwatch-cybersecurity To homebrew
Medium
Vulnerability Details
The process described in this page is not secure - no checksum / PGP signature is published and there is no way to check the download is legit: https://brew.sh/ "/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"" This can lead to supply chain attacks such as the one that just happened here: https://about.codecov.io/security-update/ This can lead to two possible attacks: 1. Supply chain attacks if the script is modified on the server. 2. Injection attacks if the TLS connections are compromised. ## Impact For brew, a checksum and a way to check it should be provided, and security information should be added to the webpage referenced above. This way users can check the downloads.
Actions
View on HackerOne
Report Stats
  • Report ID: 1166535
  • State: Closed
  • Substate: informative
  • Upvotes: 8
Share this report