Community
    • Login

    About plugin and malware

    Scheduled Pinned Locked Moved Security
    13 Posts 8 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • wonkawillyW
      wonkawilly
      last edited by wonkawilly

      Premise that personally I have never had problems with n++ and plugins about malware of any kind at least with the version I use and used and I downloaded from official web sites, but nevertheless I would like to ask if all plugins are scanned for malware/viruses and so on, before they make their way to be officially available to all n++ users to be downloaded by using Plugin Admin?
      I wish to highlight that I am not asking about other plugins that might be available in other websites around but only about those that are officially available by using Plugin Admin.
      Why Am I asking? Just Because I am curious on.
      Thanks in advance.

      Alan KilbornA rdipardoR 2 Replies Last reply Reply Quote 2
      • Alan KilbornA
        Alan Kilborn @wonkawilly
        last edited by

        @wonkawilly said in About plugin and malware:

        Why Am I asking? Just Because I am curious on.

        It’s a good question; I wouldn’t mind knowing if plugins are vetted before making the list. (Somehow I doubt it…)

        Snabel42S 1 Reply Last reply Reply Quote 0
        • Snabel42S
          Snabel42 @Alan Kilborn
          last edited by

          @Alan-Kilborn I know my IT-admins would like me to tell them how they can control security if they allow users to freely download un-vetted DLL’s into the APP (by allowing users to freely us Plugins Admin).

          1 Reply Last reply Reply Quote 1
          • rdipardoR
            rdipardo @wonkawilly
            last edited by rdipardo

            https://github.com/notepad-plus-plus/nppPluginList/issues/53

            None of the ideas pitched on GitHub have materialized, however. Plugin *.zip archives have to pass a checksum validation to get onto the distributed Plugin List, but that’s it.

            The real danger is that (apart from nppPluginList.dll itself) N++ will blindly load any DLL without validation: https://github.com/notepad-plus-plus/notepad-plus-plus/issues/13964

            dinkumoilD wonkawillyW 2 Replies Last reply Reply Quote 1
            • dinkumoilD
              dinkumoil @rdipardo
              last edited by

              @rdipardo said in About plugin and malware:

              The real danger is that (apart from nppPluginList.dll itself) …

              As I suggested >>> here <<<, file nppPluginList.dll is already loaded in a way that prevents any execution of code that could be included in it. It is loaded as a data file, see >>> this commit<<<.

              1 Reply Last reply Reply Quote 2
              • wonkawillyW
                wonkawilly @rdipardo
                last edited by wonkawilly

                @rdipardo

                @rdipardo said in About plugin and malware:

                https://github.com/notepad-plus-plus/nppPluginList/issues/53

                Plugin *.zip archives have to pass a checksum validation to get onto the distributed Plugin List, but that’s it.

                I seriously doubt that a checksum validation is useful to check if an executable file contains malware: usually it is more useful to check if a package sent throughout a network or saved into a memory have been altered during the transfer or it equals the original sent. So a checksum is more a error check than a malware check IMHO.
                OK can be used for security too if the original programmer team uses a checksum to allow users to validate their copy comparing the loca checksum result with the string the programmers have calculated for the original uploaded file. But still this does not indicate the absence of malware into a software. It just says if the file you have downloaded is the same on which the checksum was calculated before uploading it to a server to see if in the meantime the file has changed a bit…

                Alan KilbornA rdipardoR 2 Replies Last reply Reply Quote 0
                • Alan KilbornA
                  Alan Kilborn @wonkawilly
                  last edited by Alan Kilborn

                  @wonkawilly

                  I don’t think @rdipardo was singing the praises of the checksum; key phrasing was where he said “…but that’s it” – meaning it is minimalistic, and not up to the task of real protection.

                  1 Reply Last reply Reply Quote 1
                  • rdipardoR
                    rdipardo @wonkawilly
                    last edited by

                    @wonkawilly,

                    @Alan-Kilborn ha ragione. Siamo in effetti d’accordo per quanto alla pessima sicurezza nell’ambito dei plugin. Però ciò che va bene per la sicurezza crea di solito impedimenti per l’esperienza dell’utente, e la «filosofia» del N++ mira sin dall’inizio alla soddisfazione dell’utente.


                    @Alan-Kilborn is right. We’re on the same page as far as the lousy state of plugin security is concerned. But what’s good for security is usually bad for user experience, and N++'s “philsophy” has always made a top priority of user satisfaction.

                    wonkawillyW 1 Reply Last reply Reply Quote 4
                    • wonkawillyW
                      wonkawilly @rdipardo
                      last edited by wonkawilly

                      @rdipardo
                      Well aiming to the user satisfaction is always good but I am not sure how satisfied can be any eventual user that gets on its system a spreading malware originated from an unchecked N++ plugin…
                      I repeat, I am not here for doing any scaremongering: for the moment I never had any problem, but we can never be completely sure…
                      Maybe a possible solution could be that the people that prepare the notepad++ plugin repository scan with Virus Total the plugins before they make their way to the official repository and publish a link into the description downloaded by Plugin Admin and into the table that lists all plugins in the repo, that allows to go to the scan result page for that plugin.
                      This could mitigate the risks and shield the final users from eventual threats.
                      This scan can be done periodically to the whole Plugin repository and one by one for each plugin making its way to the repository itself, the first time a new plugin is uploaded and in case of new version updates.
                      IMHO N++ is very respected around the world but a plugin with a malware in it that makes its way from the official plugin repository handled by Plugin Admin to the final user machine, can compromise all the efforts made to keep the positive image that N++ has gained over time and it might seriously mine the efforts to keep its positive image for all the user like me that love to use it on daily basis.

                      PeterJonesP 1 Reply Last reply Reply Quote 3
                      • PeterJonesP
                        PeterJones @wonkawilly
                        last edited by

                        Does VirusTotal have a set of API URLs? Quick search: yes, it does.

                        Thus, someone might be able to create a GitHub action that would trigger on Pull Request: anytime someone asks to add or update a plugin in the Plugin List, the VirusTotal API could be polled with submitted DLL, and only “pass” if VirusTotal passes.

                        Mark OlsonM 1 Reply Last reply Reply Quote 3
                        • Mark OlsonM
                          Mark Olson @PeterJones
                          last edited by

                          @PeterJones
                          Looks to me like the VirusTotal API was already considered a while back in this issue in the NppPluginList repo. ArkadiuszMichalski made some reasonable points about technical difficulty/feasibility of implementing this in a way that limits the annoyance of dealing with false alarms.

                          Of course, the post is more than two years old now, so maybe the API is better and more reliable now.

                          1 Reply Last reply Reply Quote 1
                          • B
                            bitRAKE
                            last edited by

                            Interesting breakdown of an attack on mimeTools.dll.
                            h**ps://asec.ahnlab.com/ko/63738/

                            Obviously, it’s not the official Notepad++ package.

                            Mark OlsonM 1 Reply Last reply Reply Quote 1
                            • Mark OlsonM
                              Mark Olson @bitRAKE
                              last edited by

                              @bitRAKE
                              Good catch! I already an issue in the mimeTools repo referencing that article.

                              Of course, if it is, as you say, not an issue with the official plugin but rather an issue with Notepad++ loading a malicious DLL of the same name, I guess there’s nothing Don Ho can do about the issue.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              The Community of users of the Notepad++ text editor.
                              Powered by NodeBB | Contributors