A malicious user can replace the script code with any code which would be run with the next build process.
Of course this is not a problem on build hosts with a single user or only trusted users as long as these build hosts cannot be accessed from outside (otherwise for example security issues in web applications could be used to modify the script files). But if this is a precondition for secure builds, it must be mentioned prominently.
To Reproduce
Steps to reproduce the behavior:
Clone kitodo-production and enter its root directory.
Prepare the build und run mvn clean build (optionally with additional parameters).
The scripts listed above are now world-writable.
Expected behavior
The build process must not create files which are world-writable.
Release
The bug exists for a long time now – also in the latest code.
Describe the bug After running
mvn clean build
several script files are writable for any user who has access to the build host:A malicious user can replace the script code with any code which would be run with the next build process.
Of course this is not a problem on build hosts with a single user or only trusted users as long as these build hosts cannot be accessed from outside (otherwise for example security issues in web applications could be used to modify the script files). But if this is a precondition for secure builds, it must be mentioned prominently.
To Reproduce Steps to reproduce the behavior:
mvn clean build
(optionally with additional parameters).Expected behavior The build process must not create files which are world-writable.
Release The bug exists for a long time now – also in the latest code.