Temporal Blog 09月30日 19:15
Temporal加入CVE计划,提升软件安全透明度
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Temporal已被添加到CVE计划中,成为CVE编号机构(CNA),这是团队的重要里程碑,体现了其对安全和透明度的承诺。作为组织,现在能够清晰地传达有关其软件的具体问题。如果自托管Temporal的用户扫描已知漏洞,他们将收到关于已知问题的警报,并可以确定需要采取哪些措施来保护他们的Temporal集群。CVE代表“常见漏洞和暴露”,CVE编号可以影响数百万组织,也可以仅影响特定情况下少数用户。Temporal决定成为CNA的主要因素之一是Datadog今年早些时候的一份报告,该团队发现并报告了一个可能影响自托管Temporal服务器的用户的问题。该问题涉及Temporal服务器强制执行的名字空间保护,由于默认配置未强制执行这些检查,在特定条件下可能会被绕过。攻击者必须创建包含目标名字空间信息的任务令牌以及工作流历史信息来创建令牌。但是,一旦创建令牌,就可以用来对目标名字空间进行一些破坏性API调用。我们已发布CVE-2023-3485来跟踪此漏洞。尚未报告有此漏洞被利用的情况。Temporal Cloud,我们的Temporal服务器SaaS服务,未受影响。此不安全的默认配置已在Temporal版本1.20中修复;虽然较新版本的Temporal包含许多性能和安全更新,并且我们建议升级,但此漏洞可以通过在1.9.1及更高版本中设置动态配置选项frontend.enableTokenNamespaceEnforcement为true来在早期版本中预防。

🔒Temporal成为CVE编号机构(CNA),标志着其在安全和透明度承诺方面的重要里程碑。这意味着Temporal现在能够更清晰地传达其软件的具体问题,并帮助用户识别和修复潜在的安全漏洞。

📌CVE(常见漏洞和暴露)编号用于跟踪和标识安全漏洞。通过成为CNA,Temporal能够为其软件中的漏洞分配CVE编号,从而提高透明度并促进漏洞的公开报告和修复。

🔍Datadog报告了一个影响自托管Temporal服务器的漏洞,该漏洞涉及名字空间保护的绕过。攻击者可以通过创建包含目标名字空间信息的任务令牌来执行破坏性API调用。Temporal已分配CVE-2023-3485来跟踪此漏洞,但尚未报告有此漏洞被利用的情况。

🛡️Temporal已在版本1.20中修复了此不安全的默认配置。尽管如此,用户可以通过在1.9.1及更高版本中设置动态配置选项frontend.enableTokenNamespaceEnforcement为true来在早期版本中预防此漏洞。

🌐Temporal Cloud(Temporal服务器的SaaS服务)未受此漏洞影响。这表明Temporal在不同部署环境中的安全性是不同的,用户应根据自己的需求选择合适的部署方式并采取相应的安全措施。

Temporal has been added to the CVE Program as a CVE Numbering Authority (CNA). This is a great milestone for our team and reflects our commitment to security and transparency. As an organization, we are now able to clearly communicate specific issues regarding our software. If users who self-host Temporal scan for known vulnerabilities, they will now receive alerts about known issues and can determine what they need to do to secure their Temporal clusters.

CVE stands for “Common Vulnerability and Exposure,” but most people know it as a series of characters representing a security issue. The security issues that earn a CVE number can range from vulnerabilities that impact millions of organizations to those that impact only a small number of users under specific circumstances. You might’ve heard of the OpenSSL “Heartbleed” vulnerability first reported back in 2014 (CVE-2014-0160), or the Janet Jackson music video that can cause hard drives to crash (CVE-2022-38392).

A major factor in our decision to become a CNA was a report earlier this year from our friends at Datadog. Folks from that team discovered and reported an issue in which potentially impacted users self-hosting Temporal Server. The issue dealt with namespace protections enforced by Temporal Server, which could be circumvented under certain conditions due to the default configuration not enforcing these checks. An attacker would have to create their own task token with information about the target namespace as well as information from a workflow’s history to create the token. However, once the token was created, it could be used to make some disruptive API calls to the target namespace. We have issued CVE-2023-3485 to track this vulnerability. There have been no reports of this being exploited. Temporal Cloud, our SaaS offering of Temporal Server, was not affected. This insecure default configuration was remedied in Temporal version 1.20; although newer versions of Temporal include many performance and security updates, and upgrading is our recommendation, this vulnerability can be prevented in prior versions of Temporal by setting the dynamic configuration option frontend.enableTokenNamespaceEnforcement to true (available in version 1.9.1 and later).

Software is complex, and balancing backward compatibility with speed is a difficult task. Building software without vulnerabilities is ideal, but we also accept and understand this idealistic goal is not obtainable. (If you want to help us write great code, we’re hiring!) The next best thing is to be receptive to our community when we receive reports, and announce issues—such as this one—to our community. The industry-standard way of accomplishing this is via CVEs.

Thank you for trusting our software, and we hope this level of transparency helps you continue trusting us. Please reach out to us with any questions.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Temporal CVE 安全 透明度 漏洞 软件
相关文章