A high severity security vulnerability was recently discovered in Galaxy
Interactive Environments (GIEs) by the Galaxy Committers Team. Anyone with
a Galaxy account can exploit this vulnerability to execute arbitrary code
on the Galaxy server as the user running the Galaxy server process.
This is possible due to incorrect quoting of user-provided data passed to a
shell execution context for the GIE `docker run` command.
This vulnerability has been assigned the disclosure ID GX-2017-0002.
This vulnerability affects Galaxy version 17.05 and later that have been
configured to enable Galaxy Interactive Environments.
The vulnerability only affects Galaxy servers on which Galaxy Interactive
Environments are enabled (by setting the
option in galaxy.ini). Because the vulnerability can be exploited to
execute arbitrary code, the impact for affected servers is severe.
Administrators of Galaxy servers where GIEs *are* enabled should update
Administrators of Galaxy servers where GIEs are *not* enabled *should* update
their servers to ensure they are not vulnerable should they enable GIEs at
a later date, however, it is not critical to do so immediately.
Per our security policies, we have created fixes for all affected
versions of Galaxy. These have been committed to the corresponding
`release_YY.MM` (and `dev`) branches in the Galaxy GitHub repository.
The fix switches from using shell execution to direct execution with
exec(3) and therefore is not susceptible to shell escaping exploits
The fixes are available on the `release_17.05`, `release_17.09`, and `dev`
branches in the Galaxy GitHub repository. You can simply `git pull` or
use your normal update procedure to get the changes.
For the changes to take effect, *YOU MUST RESTART ALL GALAXY SERVER
--nate (on behalf of the Galaxy Committers)