Описание
kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the run-terraform reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build.
Ссылки
- PatchThird Party Advisory
- PatchRelease NotesThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- PatchRelease NotesThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.7.5 (исключая)
cpe:2.3:a:kartverket:github-workflows:*:*:*:*:*:*:*:*
EPSS
Процентиль: 77%
0.01075
Низкий
8.8 High
CVSS3
Дефекты
CWE-94
CWE-94
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
run-terraform allows for RCE via terraform plan
EPSS
Процентиль: 77%
0.01075
Низкий
8.8 High
CVSS3
Дефекты
CWE-94
CWE-94