Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-52137
HistoryDec 29, 2023 - 5:16 p.m.

Command injection

2023-12-2917:16:00
PRIOn knowledge base
www.prio-n.com
6
github
command injection
security patch
file verification
secrets leakage

8.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

23.3%

The tj-actions/verify-changed-files action allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. The verify-changed-files workflow returns the list of files changed within a workflow execution. This could potentially allow filenames that contain special characters such as ; which can be used by an attacker to take over the GitHub Runner if the output value is used in a raw fashion (thus being directly replaced before execution) inside a run block. By running custom commands, an attacker may be able to steal secrets such as GITHUB_TOKEN if triggered on other events than pull_request.

This has been patched in versions 17 and 17.0.0 by enabling safe_output by default and returning filename paths escaping special characters for bash environments.

CPENameOperatorVersion
verify-changed-fileslt17.0.0

8.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

23.3%

Related for PRION:CVE-2023-52137