Lucene search

K
cve[email protected]CVE-2022-39321
HistoryOct 25, 2022 - 5:15 p.m.

CVE-2022-39321

2022-10-2517:15:55
CWE-78
web.nvd.nist.gov
36
6
github actions
runner
vulnerability
security
docker
cli
github workflow
environment variable

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.5%

GitHub Actions Runner is the application that runs a job from a GitHub Actions workflow. The actions runner invokes the docker cli directly in order to run job containers, service containers, or container actions. A bug in the logic for how the environment is encoded into these docker commands was discovered in versions prior to 2.296.2, 2.293.1, 2.289.4, 2.285.2, and 2.283.4 that allows an input to escape the environment variable and modify that docker command invocation directly. Jobs that use container actions, job containers, or service containers alongside untrusted user inputs in environment variables may be vulnerable. The Actions Runner has been patched, both on github.com and hotfixes for GHES and GHAE customers in versions 2.296.2, 2.293.1, 2.289.4, 2.285.2, and 2.283.4. GHES and GHAE customers may want to patch their instance in order to have their runners automatically upgrade to these new runner versions. As a workaround, users may consider removing any container actions, job containers, or service containers from their jobs until they are able to upgrade their runner versions.

Affected configurations

Vulners
NVD
Node
actionsrunnerRange<2.283.4
OR
actionsrunnerRange2.284.02.285.2
OR
actionsrunnerRange2.286.02.289.4
OR
actionsrunnerRange2.290.02.293.1
OR
actionsrunnerRange2.294.02.296.2

CNA Affected

[
  {
    "vendor": "actions",
    "product": "runner",
    "versions": [
      {
        "version": "< 2.283.4",
        "status": "affected"
      },
      {
        "version": ">= 2.284.0, < 2.285.2",
        "status": "affected"
      },
      {
        "version": ">= 2.286.0, < 2.289.4",
        "status": "affected"
      },
      {
        "version": ">= 2.290.0, < 2.293.1",
        "status": "affected"
      },
      {
        "version": ">= 2.294.0, < 2.296.2",
        "status": "affected"
      }
    ]
  }
]

Social References

More

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.5%

Related for CVE-2022-39321