The Rust Security Response working group (WG) has flagged a strange security vulnerability that is being tracked as CVE-2021-42574 and is urging developers to upgrade to Rust version 1.56.1.
News of the obscure bug was disseminated in a mailing list today. The Rust project has also flagged the Unicode "bidirectional override" issue in a blogpost. But it's a general bug that doesn't affect just Rust but all code that's written in popular languages that use Unicode.
SEE: Cloud security in 2021: A business guide to essential tools and best practices
Open-source projects such as operating systems often rely on human review of all new code to detect any potentially malicious contributions by volunteers. But the security researchers at Cambridge University said they have discovered ways of manipulating the encoding of source code files so that human viewers and compilers see different logic.
"The trick is to use Unicode control characters to reorder tokens in source code at the encoding level. These visually reordered tokens can be used to display logic that, while semantically correct, diverges from the logic presented by the logical ordering of source code tokens. Compilers and interpreters adhere to the logical ordering of source code, not the visual order," the researchers said. The attack is to use control characters embedded in comments and strings to reorder source code characters in a way that changes its logic.
Software development is international and Unicode — a foundation for text and emoji — supports left-to-right languages, such as English, and right-to-left languages, such as Persian. It does this through "bidirectional override", an invisible feature called a codepoint that enables embedding left-to-right words inside a right-to-left sentence and vice versa.
While they're normally used to embed a word inside a sentence constructed in the reverse direction, Anderson and Microsoft security researcher Nicholas Boucher discovered that they could be used to change how source code is displayed in certain editors and code-review tools.
It means that reviewed code can be different than the compiled code and shows how organizations could be hacked through tampered open-source code.
"This attack is particularly powerful within the context of software supply chains. If an adversary successfully commits targeted vulnerabilities into open-source code by deceiving human reviewers, downstream software will likely inherit the vulnerability," the researchers warn.
SEE: Gartner releases its 2021 emerging tech hype cycle: Here's what's in and headed out
Google has found that open-source software supply chain attacks have escalated in the past year.
Rust isn't a widely used programming language, but it has been adopted for systems (versus application) programming by Google, Facebook, Microsoft, Amazon Web Services (AWS) and more for its memory-related safety guarantees.
"Rust 1.56.1 introduces two new lints to detect and reject code containing the affected codepoints. Rust 1.0.0 through Rust 1.56.0 do not include such lints, leaving your source code vulnerable to this attack if you do not perform out-of-band checks for the presence of those codepoints," the Rust project said.
The Rust project analyzed its add-on software packages, dubbed "crates" — it reviewed everything published on crates.io from 17 October 2021 — and determined that five crates have the affected codepoints in their source code. However, it didn't find any malicious codepoints.