Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-15272

Опубликовано: 26 окт. 2020
Источник: nvd
CVSS3: 8.7
CVSS3: 9.6
CVSS2: 6.5
EPSS Низкий

Описание

In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the tag input] or manage to alter the value of [the GITHUB_REF environment variable]. The problem has been patched in version 1.0.1. If you don't use the tag input you are most likely safe. The GITHUB_REF environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the tag input and cannot upgrade to > 1.0.0 make sure that the value is not controlled by another Action.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:git-tag-annotation-action_project:git-tag-annotation-action:*:*:*:*:*:*:*:*
Версия до 1.0.1 (исключая)

EPSS

Процентиль: 56%
0.00343
Низкий

8.7 High

CVSS3

9.6 Critical

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-78

EPSS

Процентиль: 56%
0.00343
Низкий

8.7 High

CVSS3

9.6 Critical

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-78