Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xw35-rrcp-g7xm

Опубликовано: 19 июл. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

Impact

The server allow to create any user who can trigger a pipeline run malicious workflows:

  • Those workflows can either lead to a host takeover that runs the agent executing the workflow.
  • Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten.

Patches

https://github.com/woodpecker-ci/woodpecker/pull/3933

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading? Enable the "gated" repo feature and review each change upfront

References

Credits

  • Daniel Kilimnik @D_K_Dev (Neodyme AG)
  • Felipe Custodio Romero @localo (Neodyme AG)

Пакеты

Наименование

go.woodpecker-ci.org/woodpecker/v2

go
Затронутые версииВерсия исправления

< 2.7.0

2.7.0

Наименование

go.woodpecker-ci.org/woodpecker

go
Затронутые версииВерсия исправления

< 2.7.0

2.7.0

EPSS

Процентиль: 70%
0.0066
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-22
CWE-74

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 года назад

Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 70%
0.0066
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-22
CWE-74