Uh oh!
There was an error while loading. Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork 34.2k
module: check env NODE_PRELOAD for preload modules#11888
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Uh oh!
There was an error while loading. Please reload this page.
Conversation
jchip commented Mar 17, 2017 • edited
Loading Uh oh!
There was an error while loading. Please reload this page.
edited
Uh oh!
There was an error while loading. Please reload this page.
2a5a163 to 89fba41Comparejasnell commented Mar 17, 2017
@nodejs/ctc ... thoughts on this? |
bnoordhuis commented Mar 17, 2017
I've said before that I'm not a fan of environment variables and I'm certainly no fan of environment variables that let you load arbitrary files. It would be a security disaster with a node binary that is setuid root. |
cjihrig left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would also require documentation.
lib/internal/bootstrap_node.js Outdated
| functionpreloadModules(){ | ||
| if(process._preload_modules){ | ||
| NativeModule.require('module')._preloadModules(process._preload_modules); | ||
| letpreloads=process._preload_modules; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you use var here.
test/parallel/test-preload.js Outdated
| }); | ||
| // test NODE_REQUIRE with multiple modules works | ||
| process.env.NODE_REQUIRE=fixtureA+path.delimiter+fixtureB; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add a test where there is whitespace surrounding the delimiter?
test/parallel/test-preload.js Outdated
| childProcess.exec( | ||
| nodeBinary+' '+fixtureB, | ||
| function(err,stdout,stderr){ | ||
| if(err){ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Instead of an if statement, can we just make assertions on err?
jchip commented Mar 17, 2017
@bnoordhuis how about checking setuid? letisSetUidRoot=false;if(process.platform!=="win32"){isSetUidRoot=process.getuid()!==process.geteuid()||process.getgid()!==process.getegid();}if(!isSetUidRoot&&process.env.NODE_REQUIRE){constd=NativeModule.require('path').delimiter;preloads=(preloads||[]).concat(process.env.NODE_REQUIRE.split(d));} |
jchip commented Mar 17, 2017
@cjihrig I wasn't sure whether doc should be included in this PR or in a separate PR. There is a YAML comment in the doc that indicates what version a feature was added. Should I just omit that when adding the docs? |
jasnell commented Mar 17, 2017
I can't say that I'm a big fan of this idea either, for the same reasons as @bnoordhuis. There are fairly significant security ramifications should a malicious app successfully manage to manipulate the environment variables on a system. There are a couple of ways to protect it -- for instance, we could check Checking the uid is only a partial fix in that it protects against the root case but still puts users at risk. For instance, imagine an electron app that picks this up. A malicious app could theoretically inject malicious spyware code into the electron app by setting the env. |
jchip commented Mar 17, 2017
I am not 100% clear on the malicious app scenario yet, but I imagine that if an app is able to sneak in and inject a malicious code in your FS somewhere and set an env, it can do its bidding w/o requiring another JS app to execute its code? |
jchip commented Mar 17, 2017
Some other idea: to further protect this, maybe only allow modules that's been |
jasnell commented Mar 17, 2017
Manipulating the environment variables for a given user is a fairly trivial attack vector for a malicious bit of code and can be done with a minimal level of permissions on the system, unfortunately. It's common enough to even have it's own CAPEC classification. The basic idea is that malicious code running with lesser privileges can easily modify the environment variables depended on by code with higher privileges and higher sensitivity. |
jchip commented Mar 17, 2017
With shell, unless I source a script, most apps can't affect parent env but its own env copy only. |
jasnell commented Mar 17, 2017
There are a number of proofs of concept that can be found via Google. Here's a quick read that explains a few such mechanisms: https://breakingmalware.com/vulnerabilities/elastic-boundaries-elevating-privileges-by-environment-variables-expansion/ |
jchip commented Mar 17, 2017
Thanks for the link. Interesting read. However, it also confirms the same question I was asking. Its scenarios 1-3 are all about the "malicious app" modifying its own env, and the last 2 scenarios is about windows specific UAC that elevates malicious code to admin priv, which then can do almost anything it want, including modifying persistent global env. I understand the concern. Is limiting the scope of the module to the node binary's global install OK? |
jasnell commented Mar 17, 2017
Not sure. Stewing over it a bit more. Also thinking if there's another way to tackle the basic requirement. |
evanlucas commented Mar 17, 2017
I'm leaning towards -1 on this. Not sure if it is worth the risk. |
jchip commented Mar 17, 2017
OK, thanks. I was thinking limiting to node binary's global install, because if any malicious code can get code in there, you are pretty toasted anyways. Imagine someone just modify npm's code. |
ofrobots commented Mar 17, 2017
Previous discussion: #881. |
Fishrock123 commented Mar 17, 2017
I agree with @bnoordhuis & @jasnell - not a fan of the idea. :/ |
jchip commented Mar 17, 2017
Anyways, this is what I am playing with, I think limiting to the global installed functionpreloadModules(){varpreloads=process._preload_modules;varisSetUidRoot=false;if(process.platform!=="win32"){isSetUidRoot=process.getuid()!==process.geteuid()||process.getgid()!==process.getegid();}if(!isSetUidRoot&&process.env.NODE_REQUIRE){constpath=NativeModule.require('path');constnodeRequires=process.env.NODE_REQUIRE.split(path.delimiter);constglobalNm=path.join(process.argv[0],"../../lib/node_modules");preloads=(preloads||[]).concat(nodeRequires.filter(function(n){returnn.startsWith(globalNm);}));}if(preloads){NativeModule.require('module')._preloadModules(preloads);}} |
jasnell commented Mar 17, 2017
There's potentially a different approach that could be taken here. I'm not convinced that it's a good idea, but it's possible. First, however, I have to say that I do not like the idea of preloaded modules being applied automatically without an explicit opt-in. There is way too much opportunity for abuse. That said, we could potentially have something like On POSIX systems, this directory should be owner R/W only (e.g. Then when the
As I'm writing this up, we could potentially include support for Again, this is just a brainstorm. I'm no where near convinced that this is something we should do. |
jchip commented Mar 17, 2017
@jasnell Thanks for the ideas. I was contemplating with quite a few things including something like I even did this: (placing the following script in #!/bin/bash real_node_bin=$(which -a node | grep -v "$0"| head -1)$real_node_bin -r /usr/local/lib/node/preload.js $*My goal is just a persistent cross invocation Regarding security concerns, I am all for that. In that regard, then even I think limiting scope to global |
jchip commented Mar 17, 2017
Another thought, any attack that's able to gain enough priv to modify env globally to make this an issue, they can just change |
jasnell commented Mar 17, 2017
@jchip ... one way to play around with various scenarios here would be to create a wrapper script for the node binary that does basically what you want but shells out to the appropriate |
jchip commented Mar 17, 2017
I think for any attack to exploit something, the first requirement is to get the malicious code to the system first, in memory or FS. So regardless of how we specify what to preload, a malicious code has to be installed first. If we depend on something like So I think limiting to global I understand that doing this is in generally not something great, but given that the It'd be nice if the preload always work cross invocations though and I am trying to address that. |
jchip commented Mar 17, 2017
I am going to update the PR with the things I've mentioned:
I hope this will give everyone something concrete to ponder over. I hope we can come to something that's OK with everyone to support cross invocation preloads. |
jchip commented Mar 17, 2017
also, if env var is generally frown upon for everyone, as I mentioned, we can have |
3193ec1 to be56876CompareAdds a new feature that checks the environment variable NODE_PRELOAD that should be a : (or ; on windows) delimited string of modules inside the global node_modules dir to preload, the same as those that can be specified by the -r command line option except this is limited to global node_modules. Each module can be the absolute path of the module or just the name of the module under the global node_modules dir. Implements: nodejs#11853
| if(process._preload_modules){ | ||
| NativeModule.require('module')._preloadModules(process._preload_modules); | ||
| varallPreloads=process._preload_modules; | ||
| varisSetUidRoot=false; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If this is going to happen, this var should be called isSetUid
addaleax commented Mar 19, 2017
I can’t say I haven’t wished for this to exist, but I’m not too excited about this either :/ |
| varisSetUidRoot=false; | ||
| if(process.platform!=='win32'){ | ||
| isSetUidRoot=process.getuid()!==process.geteuid()|| |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why aren't you using SafeGetenv()?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not sure how. Can you tell me please?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Look for how OPENSSL_CONF is loaded from env, in such a way that its ignored if the IDs aren't safe, much as you are manually trying to check here.
| } | ||
| }; | ||
| constglobalNm=path.join(process.argv[0],'../../lib/node_modules/'); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It doesn't make any sense to disallow requiring a packages own dependencies, please remove this. Resolution should be identical to -r, obscure special cases decrease security, not increase (and control over environment and fs as this check assumes is complete control of an executable already via LD_PRELOAD).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
At the moment I am waiting for an approach that everyone can at least not put a -1 on first. If @nodejs/ctc have an approach that's acceptable, I'd implement that.
sam-github commented Mar 22, 2017
I generally support NODEOPT, not a env var per command line flag, but the functionality this adds is critical, it will be very important to be able to do |
gibfahn commented Mar 22, 2017
@sam-github if there were to be a Also is there an issue to discuss adding such an environment variable? I'd be +1 on that. If we're going to have variables, let's just have one and keep it simple. |
sam-github commented Mar 23, 2017
@gibfahn conversation moved to #11997, I'm sure you saw, and previous conversation was at #881 (comment) |
Adds a new feature that checks the environment variable NODE_PRELOAD
that should be a : (or ; on windows) delimited string of modules inside
the global node_modules dir to preload, the same as those that can be
specified by the -r command line option except this is limited to
global node_modules.
Each module can be the absolute path of the module or just the name
of the module under the global node_modules dir.
Implements #11853
Checklist
make -j4 test(UNIX), orvcbuild test(Windows) passesAffected core subsystem(s)