Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-52137

Опубликовано: 29 дек. 2023
Источник: nvd
CVSS3: 7.7
CVSS3: 8.8
EPSS Низкий

Описание

The tj-actions/verify-changed-files action allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. The verify-changed-files workflow returns the list of files changed within a workflow execution. This could potentially allow filenames that contain special characters such as ; which can be used by an attacker to take over the GitHub Runner if the output value is used in a raw fashion (thus being directly replaced before execution) inside a run block. By running custom commands, an attacker may be able to steal secrets such as GITHUB_TOKEN if triggered on other events than pull_request.

This has been patched in versions 17 and [17.0.0](

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:tj-actions:verify-changed-files:*:*:*:*:*:github:*:*
Версия до 17.0.0 (исключая)

EPSS

Процентиль: 70%
0.00621
Низкий

7.7 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-20
CWE-77

Связанные уязвимости

CVSS3: 7.7
github
около 2 лет назад

Potential Actions command injection in output filenames (GHSL-2023-275)

EPSS

Процентиль: 70%
0.00621
Низкий

7.7 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-20
CWE-77