Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3wf2-2pq4-4rvc

Опубликовано: 19 июл. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6
CVSS3: 7.5

Описание

Woodpecker's custom environment variables allow to alter execution flow of plugins

Impact

The server allow to create any user who can trigger a pipeline run malicious workflows:

  • Those workflows can either lead to a host takeover that runs the agent executing the workflow.
  • Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten.

Patches

https://github.com/woodpecker-ci/woodpecker/pull/3909 https://github.com/woodpecker-ci/woodpecker/pull/3934

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading? Enable the "gated" repo feature and review each change upfront of running

References

Credits

  • Daniel Kilimnik @D_K_Dev (Neodyme AG)
  • Felipe Custodio Romero @localo (Neodyme AG)

Пакеты

Наименование

go.woodpecker-ci.org/woodpecker/v2

go
Затронутые версииВерсия исправления

< 2.7.0

2.7.0

Наименование

go.woodpecker-ci.org/woodpecker

go
Затронутые версииВерсия исправления

< 2.7.0

2.7.0

EPSS

Процентиль: 54%
0.00314
Низкий

6 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 54%
0.00314
Низкий

6 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-74