Логотип exploitDog
bind:CVE-2023-51664
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-51664

Количество 2

Количество 2

nvd логотип

CVE-2023-51664

около 2 лет назад

tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-mcph-m25j-8j63

около 2 лет назад

tj-actions/changed-files has Potential Actions command injection in output filenames (GHSL-2023-271)

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-51664

tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade.

CVSS3: 7.3
1%
Низкий
около 2 лет назад
github логотип
GHSA-mcph-m25j-8j63

tj-actions/changed-files has Potential Actions command injection in output filenames (GHSL-2023-271)

CVSS3: 7.3
1%
Низкий
около 2 лет назад

Уязвимостей на страницу