Mass assignment weakness and GitHub security breach

GitHub had a security breach that allowed an individual to gain super-user access to repositories that he was not explicitly permitted access to. This hack involved leveraging a weakness in the mass-assignment method to upload his SSH key. GitHub has posted additional details on their blog.

Starting March 7th, 2012, GitHub is forcing an audit of all SSH keys. This might have impacted your ability to deploy on Engine Yard.

Engine Yard worked with GitHub to have the fingerprints we generate for Engine Yard deployments approved. If you have deployment issues, submit a ticket with Engine Yard Support.

Take action to protect your application

  1. Review your SSH keys to make sure that there are no keys that you don't recognize:

  2. Read this gist "How Homakov hacked GitHub and the line of code that could have prevented it" to understand the breach and how to prevent it.

  3. Audit your code to look for vulnerable areas.
    Tip: Use this plugin: find_mass_assignment.

  4. Review the plugins for Rails to make sure that your application is secure. See The Ruby Toolbox.

  5. Whitelist your attributes that use the attr_accessible method.
    (The root cause of this issue is the implicit way that Rails handles updates using the "update_attributes method".)


If you have feedback or questions about this page, add a comment below. If you need help, submit a ticket with Engine Yard Support.

Comments

Please sign in to leave a comment.

Powered by Zendesk