Lucene search

K
cveGitHub_MCVE-2023-49291
HistoryDec 05, 2023 - 12:15 a.m.

CVE-2023-49291

2023-12-0500:15:09
CWE-20
GitHub_M
web.nvd.nist.gov
12
cve-2023-49291
github action
arbitrary code execution
branch name
github_token
security vulnerability
upgrade advisory

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

56.4%

tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The tj-actions/branch-names GitHub Actions improperly references the github.event.pull_request.head.ref and github.head_ref context variables within a GitHub Actions run step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse GITHUB_TOKEN permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Vulners
Node
tj-actionsbranch-namesRange<7.0.0
OR
tj-actionsbranch-namesRange7.0.17.0.7
VendorProductVersionCPE
tj-actionsbranch-names*cpe:2.3:a:tj-actions:branch-names:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "tj-actions",
    "product": "branch-names",
    "versions": [
      {
        "version": "< 7.0.7",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

56.4%

Related for CVE-2023-49291