Lucene search

K
prionPRIOn knowledge basePRION:CVE-2020-36762
HistoryJul 18, 2023 - 3:15 p.m.

Command injection

2023-07-1815:15:00
PRIOn knowledge base
www.prio-n.com
4
ons digital ras
command injection
upgrade
version 2.0.28
critical vulnerability

9.8 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.5%

A vulnerability was found in ONS Digital RAS Collection Instrument up to 2.0.27 and classified as critical. Affected by this issue is the function jobs of the file .github/workflows/comment.yml. The manipulation of the argument $COMMENT_BODY leads to os command injection. Upgrading to version 2.0.28 is able to address this issue. The name of the patch is dcaad2540f7d50c512ff2e031d3778dd9337db2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-234248.

CPENameOperatorVersion
ras_collection_instrumentlt2.0.28

9.8 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.5%

Related for PRION:CVE-2020-36762