Differences between revisions 5 and 7 (spanning 2 versions)
Revision 5 as of 2011-06-23 18:04:00
Size: 1776
Editor: EvgeniGolov
Comment:
Revision 7 as of 2011-07-03 08:44:30
Size: 1892
Editor: EvgeniGolov
Comment:
Deletions are marked like this. Additions are marked like this.
Line 7: Line 7:
||'''appplication'''||'''in Debian'''||'''Debian Bug'''||'''Upstream Bug'''||'''library used'''||'''affected parts'''||
||[[http://gwibber.com/|gwibber]]||Yes||DebianBug:608724||[[https://bugs.launchpad.net/gwibber/+bug/705363|LP:705363]]||python's urllib2||reported against identi.ca backend, looking at the source says all backends||
||[[http://www.jezra.net/projects/heybuddy|heybuddy]]||No|| || --([[https://bugs.launchpad.net/heybuddy/+bug/798300|LP:798300]])-- ||python's urllib2||identi.ca||
||[[http://www.hotot.org/|hotot]]||Yes|| ||[[http://code.google.com/p/hotot/issues/detail?id=388|hotot issue 388]]||python !WebKit?||tested with identi.ca, twitter should be too||
||[[http://pino-app.appspot.com|pino]]||Yes|| ||[[http://code.google.com/p/pino-twitter/issues/detail?id=339|pino issue 339]]|| ||tested with identi.ca||
||[[http://pino-app.appspot.com|pino3]]||No|| ||[[https://bitbucket.org/troorl/pino3/issue/21/pino3-should-use-ssl-https-and-validate|pino3 issue 21]]|| librest ||doesn't SSL at all by default, after patching the identi.ca urls failed as expected||
||[[http://turpial.org.ve/|turpial]]||Yes||DebianBug:631422|| ||python's urllib2||identi.ca does not use HTTPS by default, fails after patching. twitter fails immediately||
||'''appplication'''||'''vulnerable?'''||'''in Debian'''||'''Debian Bug'''||'''Upstream Bug'''||'''library used'''||'''affected parts'''||
||[[http://gwibber.com/|gwibber]]||Yes||Yes||DebianBug:608724||[[https://bugs.launchpad.net/gwibber/+bug/705363|LP:705363]]||python's urllib2||reported against identi.ca backend, looking at the source says all backends||
||[[http://www.jezra.net/projects/heybuddy|heybuddy]]||No||No|| || --([[https://bugs.launchpad.net/heybuddy/+bug/798300|LP:798300]])-- ||python's urllib2||identi.ca||
||[[http://www.hotot.org/|hotot]]||Yes||Yes|| ||[[http://code.google.com/p/hotot/issues/detail?id=388|hotot issue 388]]||python !WebKit?||tested with identi.ca, twitter should be too||
||[[http://pino-app.appspot.com|pino]]||Yes||Yes|| ||[[http://code.google.com/p/pino-twitter/issues/detail?id=339|pino issue 339]]|| ||tested with identi.ca||
||[[http://pino-app.appspot.com|pino3]]||Yes||No|| ||[[https://bitbucket.org/troorl/pino3/issue/21/pino3-should-use-ssl-https-and-validate|pino3 issue 21]]|| librest ||doesn't SSL at all by default, after patching the identi.ca urls failed as expected||
||[[http://code.google.com/p/qwit/|qwit]]||No||Yes|| || ||qt4|| ||
||[[http://
turpial.org.ve/|turpial]]||Yes||Yes||DebianBug:631422|| ||python's urllib2||identi.ca does not use HTTPS by default, fails after patching. twitter fails immediately||

Inspired by gwibber bypasses certificate checking when providing the login/password for OAuth, I started looking in other (microblogging) applications whether they do proper SSL certificate checks or not.

Note 1: While I think paid SSL certificates are snake oil, the user should be able to trust the app that it is connecting to a "verified" (= already known) host.

Note 2: Not all listed apps are packaged in Debian, I'm just abusing wiki.d.o as a "generic" wiki-host.

appplication

vulnerable?

in Debian

Debian Bug

Upstream Bug

library used

affected parts

gwibber

Yes

Yes

608724

LP:705363

python's urllib2

reported against identi.ca backend, looking at the source says all backends

heybuddy

No

No

LP:798300

python's urllib2

identi.ca

hotot

Yes

Yes

hotot issue 388

python WebKit?

tested with identi.ca, twitter should be too

pino

Yes

Yes

pino issue 339

tested with identi.ca

pino3

Yes

No

pino3 issue 21

librest

doesn't SSL at all by default, after patching the identi.ca urls failed as expected

qwit

No

Yes

qt4

turpial

Yes

Yes

631422

python's urllib2

identi.ca does not use HTTPS by default, fails after patching. twitter fails immediately