Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check connection is ready in all connection required handlers #3095

Merged
merged 1 commit into from
Jul 16, 2024

Conversation

jamshale
Copy link
Contributor

This is for https://github.com/hyperledger/aries-cloudagent-python/security/advisories/GHSA-cxwq-rwgr-qp5m.

I'm pretty sure this fixes the main issues reported with basic_messages and handshake_reuse protocols. I also applied the connection ready check to all other protocols that were missing and that I think need an established connection.

I didn't apply it to any problem report protocols because I don't think a connection is required in the cases. I'm not entirely sure if the problem report protocols could still be exploited in this way. Maybe an nefarious actor could send problem reports before the connection was established and cause issues?

The details of all these protocols isn't a strong point for me. I did my best to remediate the problem but I good review by someone more knowledgeable would be appreciated.

Signed-off-by: jamshale <jamiehalebc@gmail.com>
Copy link

sonarcloud bot commented Jul 10, 2024

Quality Gate Failed Quality Gate failed

Failed conditions
63.4% Coverage on New Code (required ≥ 80%)

See analysis details on SonarCloud

@jamshale jamshale marked this pull request as ready for review July 10, 2024 18:13
@jamshale
Copy link
Contributor Author

jamshale commented Jul 10, 2024

The code coverage wants me to tests all the exception scenarios. I don't think this is really necessary but I could add them.

@jamshale jamshale requested review from dbluhm and ianco July 15, 2024 17:12
@swcurran swcurran merged commit 8a22b67 into hyperledger:main Jul 16, 2024
8 of 9 checks passed
@jamshale jamshale mentioned this pull request Jul 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Receiving unauthenticated DIDComm messages from a connection in the invitation state
3 participants