Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xcgp-r7r8-2hc9

Опубликовано: 27 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 8.6

Описание

Gradio's CI vulnerable to Command Injection

A command injection vulnerability exists in the deploy+test-visual.yml workflow of the gradio-app/gradio repository, due to improper neutralization of special elements used in a command. This vulnerability allows attackers to execute unauthorized commands, potentially leading to unauthorized modification of the base repository or secrets exfiltration. The issue arises from the unsafe handling of GitHub context information within a an action definition which is evaluated and substituted before script execution. Remediation involves setting untrusted input values to intermediate environment variables to prevent direct influence on script generation.

Пакеты

Наименование

gradio

pip
Затронутые версииВерсия исправления

< 4.18.0

4.18.0

EPSS

Процентиль: 60%
0.00402
Низкий

8.6 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 8.2
nvd
почти 2 года назад

A command injection vulnerability exists in the deploy+test-visual.yml workflow of the gradio-app/gradio repository, due to improper neutralization of special elements used in a command. This vulnerability allows attackers to execute unauthorized commands, potentially leading to unauthorized modification of the base repository or secrets exfiltration. The issue arises from the unsafe handling of GitHub context information within a `run` operation, where expressions inside `${{ }}` are evaluated and substituted before script execution. Remediation involves setting untrusted input values to intermediate environment variables to prevent direct influence on script generation.

EPSS

Процентиль: 60%
0.00402
Низкий

8.6 High

CVSS3

Дефекты

CWE-77