this post was submitted on 26 Jul 2024
1 points (100.0% liked)

Technology

58458 readers
5101 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Researchers at Truffle Security have found, or arguably rediscovered, that data from deleted GitHub repositories (public or private) and from deleted copies (forks) of repositories isn't necessarily deleted.

Joe Leon, a security researcher with the outfit, said in an advisory on Wednesday that being able to access deleted repo data – such as APIs keys – represents a security risk. And he proposed a new term to describe the alleged vulnerability: Cross Fork Object Reference (CFOR).

"A CFOR vulnerability occurs when one repository fork can access sensitive data from another fork (including data from private and deleted forks)," Leon explained.

For example, the firm showed how one can fork a repository, commit data to it, delete the fork, and then access the supposedly deleted commit data via the original repository.

The researchers also created a repo, forked it, and showed how data not synced with the fork continues to be accessible through the fork after the original repo is deleted. You can watch that particular demo.

top 27 comments
sorted by: hot top controversial new old
[–] Fijxu@programming.dev 0 points 2 months ago (2 children)

Classic microsoft. Use other git instances please. If you want actions you can use any public Forejo instance.

[–] richieadler@lemmy.myserv.one 0 points 2 months ago (1 children)
[–] Fijxu@programming.dev 0 points 2 months ago (1 children)

Yes, forgejo. My hands are cold :s

[–] sugar_in_your_tea@sh.itjust.works 0 points 2 months ago (1 children)

Fun fact, it comes from the Esperanto: forĝejo. Try typing that with cold fingers. :)

[–] Mubelotix@jlai.lu 0 points 2 months ago* (last edited 2 months ago) (1 children)

Imagine creating a whole new "universal" language and using such shitty diacritics that nobody likes

Yeah, kinda dumb. But they do have a relatively popular workaround: the x-system. So forĝejo becomes forgxejo (x = diacritic for the prev letter).

[–] eager_eagle@lemmy.world 0 points 2 months ago

that's a direct cause of how forks work, it most likely predates microsoft's acquisition

[–] AdamEatsAss@lemmy.world 0 points 2 months ago (3 children)

Oh god. That means all the spaghetti code that I ever wrote is still out there.

[–] radivojevic@discuss.online 0 points 2 months ago (2 children)

Yup. Along with the code from huge organizations. I always thought it was funny that people put their code online, blindly trusting some random company that got gobbled up by Microsoft.

[–] 4am@lemm.ee 0 points 2 months ago (1 children)

Along with every private key that was accidentally committed.

[–] radivojevic@discuss.online 0 points 2 months ago (1 children)

Ha ha, way way back in the day when I didn’t understand how keys worked, I sent a private key to another developer when they asked for my public. They were kind enough to educate me.

As a lifelong troll, I would've just generated a new pub key and made a bunch of commits as you. Then two days later, I would tell you what's up once you had time to process the confusion.

[–] Chocrates@lemmy.world 0 points 2 months ago

Your point is valid, but many (most?) enterprises don't use a forking worlflow, so I suspect open source projects will be hit harder, sadly

[–] SpaghettiYeti@lemmy.world 0 points 2 months ago
[–] Cosmos7349@lemmy.world 0 points 2 months ago (1 children)

Not only just out there. I am regenerating your spaghetti code into a new context with copilot 🧑‍✈️ Your (ai-regenerated) code will be driving our military nuclear launch code base! Congratulations!

[–] ByteOnBikes@slrpnk.net 0 points 2 months ago

Your (ai-regenerated) code will be driving our military nuclear launch code base!

What's so difficult about writing code that checks if you have 8 zeroes?

https://gizmodo.com/for-20-years-the-nuclear-launch-code-at-us-minuteman-si-1473483587

[–] Mubelotix@jlai.lu 0 points 2 months ago (2 children)

This is not a GitHub issue. It's a GIT feature. People are always going to clone your repo.

[–] Morphit@feddit.uk 0 points 2 months ago (1 children)

Well, sort of. GitHub certainly could refuse to render orphan commits. They pop up a banner saying so but I don't see why they should show the commit at all. They could still keep the data until it's garbage collected since a user might re-upload the commit in a new branch.

This seems like a non-issue though since someone who hasn't already seen the disclosed information would need to somehow determine the hash of the deleted commit.

[–] Morphit@feddit.uk 0 points 2 months ago

Ah - Actually reading the article reveals why this is actually an issue:

What's more, Ayrey explained, you don't even need the full identifying hash to access the commit. "If you know the first four characters of the identifier, GitHub will almost auto-complete the rest of the identifier for you," he said, noting that with just sixty-five thousand possible combinations for those characters, that's a small enough number to test all the possibilities.

So enumerating all the orphan commits wouldn't be that hard.

In any case if a secret has been publicly disclosed, you should always assume it's still out there. For sure, rotate your keys.

[–] best_username_ever@sh.itjust.works 0 points 2 months ago (1 children)

Forks do not exist in git. It's a GitHub feature, and a massive blunder at the same time.

[–] Mubelotix@jlai.lu 0 points 2 months ago (2 children)

Yes they exist. It's called a clone

[–] arcuru@lemmy.world 0 points 2 months ago (1 children)

The article is specifically about how GitHub forks are not the same as a git clone. A clone isn’t accessible from the upstream without the upstream pulling the changes, but this vulnerability points out that a fork on GitHub is accessible from the upstream without a pull, even if the fork is private.

It’s because GitHub under the hood doesn’t actually do a real clone so that they can save on disk usage.

[–] Mubelotix@jlai.lu 0 points 2 months ago

You actually can't turn a fork private on github

[–] best_username_ever@sh.itjust.works 0 points 2 months ago (1 children)

How can such a wrong answer get so many points? Clones and forge forks are unrelated. First, GitHub or GitLab cannot and could not link clones together without analyzing the remotes of each clone.

FFS it's a tech community...

[–] Mubelotix@jlai.lu 0 points 2 months ago

Because you are the one being wrong. Github and others only provide a nice interface around clones. That's all there is, and it doesn't matter much

[–] kernelle@lemmy.world 0 points 2 months ago

So many OpenAI keys!

[–] helenslunch@feddit.nl 0 points 2 months ago

It's the internet. Nothing is deleted.