Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-27581
HistoryMar 13, 2023 - 8:19 p.m.

CVE-2023-27581 github-slug-action vulnerable to arbitrary code execution

2023-03-1320:19:23
CWE-77
GitHub_M
www.cve.org
github-slug-action
arbitrary code execution
vulnerability
github
environment variables
workflow
pull requests
attack payload
patched action

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

45.3%

github-slug-action is a GitHub Action to expose slug value of GitHub environment variables inside of one’s GitHub workflow. Starting in version 4.0.0and prior to version 4.4.1, this action uses thegithub.head_ref` parameter in an insecure way. This vulnerability can be triggered by any user on GitHub on any workflow using the action on pull requests. They just need to create a pull request with a branch name, which can contain the attack payload. This can be used to execute code on the GitHub runners and to exfiltrate any secrets one uses in the CI pipeline. A patched action is available in version 4.4.1. No workaround is available.

CNA Affected

[
  {
    "vendor": "rlespinasse",
    "product": "github-slug-action",
    "versions": [
      {
        "version": ">= 4.0.0, < 4.4.1",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

45.3%

Related for CVELIST:CVE-2023-27581