Описание
Trivy Action runs Trivy as GitHub action to scan a Docker container image for vulnerabilities. A command injection vulnerability exists in aquasecurity/trivy-action versions 0.31.0 through 0.33.1 due to improper handling of action inputs when exporting environment variables. The action writes export VAR=<input> lines to trivy_envs.txt based on user-supplied inputs and subsequently sources this file in entrypoint.sh. Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., $(...), backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context. Version 0.34.0 contains a patch for this issue. The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to trivy_envs.txt. Access to user input is required by the malici
Уязвимые конфигурации
EPSS
5.9 Medium
CVSS3
8.1 High
CVSS3
Дефекты
Связанные уязвимости
Trivy Action runs Trivy as GitHub action to scan a Docker container im ...
Trivy Action has a script injection via sourced env file in composite action
EPSS
5.9 Medium
CVSS3
8.1 High
CVSS3