Описание
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Ссылки
- Broken Link
- Broken Link
- Broken Link
- Patch
- Patch
- Third Party Advisory
- Broken Link
- Broken Link
- Broken Link
- Patch
- Patch
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.7.0 (исключая)
cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*
EPSS
Процентиль: 70%
0.0066
Низкий
8.8 High
CVSS3
Дефекты
CWE-74
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 8.8
github
около 1 года назад
Woodpecker's custom workspace allow to overwrite plugin entrypoint executable
EPSS
Процентиль: 70%
0.0066
Низкий
8.8 High
CVSS3
Дефекты
CWE-74
NVD-CWE-noinfo