Community
Participate
Working Groups
It appears there is a security vulnerability in the IRC Plugin. By design, anyone who can communicate with the Hudson IRC bot can cause commands to be executed as an authenticated Hudson user. Password-protecting the IRC channel with the +k switch is not enough to close the hole, because anyone who knows the bot's nick can send /msg and /notice messages directly to it. My suggestion would be: 1. The bot should not accept private messages /msg or /notice. 2. The bot should refuse to accept commands on channels that aren't +k password protected. Really, these behaviors should be enforced defaults, though one could argue that they should be configurable options.