Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39321
HistoryOct 25, 2022 - 12:00 a.m.

CVE-2022-39321 GitHub Actions Runner vulnerable to Docker Command Escaping

2022-10-2500:00:00
CWE-78
GitHub_M
www.cve.org
4
github actions
cve-2022-39321
docker command escaping
security vulnerability
patching
container actions
job containers

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.001

Percentile

46.8%

GitHub Actions Runner is the application that runs a job from a GitHub Actions workflow. The actions runner invokes the docker cli directly in order to run job containers, service containers, or container actions. A bug in the logic for how the environment is encoded into these docker commands was discovered in versions prior to 2.296.2, 2.293.1, 2.289.4, 2.285.2, and 2.283.4 that allows an input to escape the environment variable and modify that docker command invocation directly. Jobs that use container actions, job containers, or service containers alongside untrusted user inputs in environment variables may be vulnerable. The Actions Runner has been patched, both on github.com and hotfixes for GHES and GHAE customers in versions 2.296.2, 2.293.1, 2.289.4, 2.285.2, and 2.283.4. GHES and GHAE customers may want to patch their instance in order to have their runners automatically upgrade to these new runner versions. As a workaround, users may consider removing any container actions, job containers, or service containers from their jobs until they are able to upgrade their runner versions.

CNA Affected

[
  {
    "vendor": "actions",
    "product": "runner",
    "versions": [
      {
        "version": "< 2.283.4",
        "status": "affected"
      },
      {
        "version": ">= 2.284.0, < 2.285.2",
        "status": "affected"
      },
      {
        "version": ">= 2.286.0, < 2.289.4",
        "status": "affected"
      },
      {
        "version": ">= 2.290.0, < 2.293.1",
        "status": "affected"
      },
      {
        "version": ">= 2.294.0, < 2.296.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.001

Percentile

46.8%

Related for CVELIST:CVE-2022-39321