Article Details
Scrape Timestamp (UTC): 2024-04-23 14:05:16.742
Source: https://thehackernews.com/2024/04/apache-cordova-app-harness-targeted-in.html
Original Article Text
Click to Toggle View
Apache Cordova App Harness Targeted in Dependency Confusion Attack. Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This causes the package manager to inadvertently download the fraudulent package from the public repository instead of the intended private repository. If successful, it can have serious consequences, such as installing all downstream customers that install the package. A May 2023 analysis of npm and PyPI packages stored in cloud environments by cloud security company Orca revealed that nearly 49% of organizations are vulnerable to a dependency confusion attack. While npm and other package managers have since introduced fixes to prioritize the private versions, application security firm Legit Security said it found the Cordova App Harness project to reference an internal dependency named cordova-harness-client without a relative file path. The open-source initiative was discontinued by the Apache Software Foundation (ASF) as of April 18, 2019. As Legit Security demonstrated, this left the door wide open for a supply chain attack by uploading a malicious version under the same name with a higher version number, thus causing npm to retrieve the bogus version from the public registry. With the bogus package attracting over 100 downloads after being uploaded to npm, it indicates that the archived project is still being put to use, likely posing severe risks to users. In a hypothetical attack scenario, an attacker could hijack the library to serve malicious code that could be executed on the target host upon package installation. The Apache security team has since addressed the problem by taking ownership of the cordova-harness-client package. It's worth noting that organizations are advised to create public packages as placeholders to prevent dependency confusion attacks. "This discovery highlights the need to consider third-party projects and dependencies as potential weak links in the software development factory, especially archived open-source projects that may not receive regular updates or security patches," security researcher Ofek Haviv said. "Although it may seem tempting to leave them as is, these projects tend to have vulnerabilities that are not getting attention and not likely to be fixed." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
Researchers discovered a dependency confusion vulnerability in the archived Apache Cordova App Harness project, exposing a method for cyber attacks.
Dependency confusion occurs when package managers mistakenly fetch malicious packages from public repositories that masquerade as legitimate private packages.
A study by Orca in May 2023 found that nearly 49% of organizations could be susceptible to these types of attacks.
The Apache project lacked safeguards against such attacks because it referenced an internal dependency without a relative file path, making it vulnerable to spoofing.
The malicious package foisted upon the Cordova App Harness managed over 100 downloads, indicating ongoing use and potential threat exposure.
Despite the project's discontinuation in 2019, its continued usage underscores the risks associated with archived but active open-source software.
The Apache security team has intervened by securing the ownership of the compromised package to mitigate future risks.
Security experts recommend creating public placeholders for packages to prevent similar attacks and stress the importance of updating and securing third-party dependencies.