Описание
github-slug-action is a GitHub Action to expose slug value of GitHub environment variables inside of one's GitHub workflow. Starting in version 4.0.0and prior to version 4.4.1, this action uses thegithub.head_ref` parameter in an insecure way. This vulnerability can be triggered by any user on GitHub on any workflow using the action on pull requests. They just need to create a pull request with a branch name, which can contain the attack payload. This can be used to execute code on the GitHub runners and to exfiltrate any secrets one uses in the CI pipeline. A patched action is available in version 4.4.1. No workaround is available.
Ссылки
- Patch
- Release Notes
- Vendor Advisory
- ExploitThird Party Advisory
- Patch
- Release Notes
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.0.0 (включая) до 4.4.1 (исключая)
cpe:2.3:a:github-slug-action_project:github-slug-action:*:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04695
Низкий
8.8 High
CVSS3
Дефекты
CWE-77
Связанные уязвимости
CVSS3: 8.8
github
почти 3 года назад
github-slug-action vulnerable to arbitrary code execution
EPSS
Процентиль: 89%
0.04695
Низкий
8.8 High
CVSS3
Дефекты
CWE-77