Lucene search

K
githubGitHub Advisory DatabaseGHSA-XW35-RRCP-G7XM
HistoryJul 19, 2024 - 7:59 p.m.

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

2024-07-1919:59:08
CWE-22
CWE-74
GitHub Advisory Database
github.com
2
woodpecker
custom workspace
overwrite
plugin
entrypoint
executable
server
user
pipeline run
malicious workflows
host takeover
secrets
patches
workarounds
security
references
credits

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.6%

Impact

The server allow to create any user who can trigger a pipeline run malicious workflows:

  • Those workflows can either lead to a host takeover that runs the agent executing the workflow.
  • Or allow to extract the secrets who would be normally provided to the plugins who’s entrypoint are overwritten.

Patches

https://github.com/woodpecker-ci/woodpecker/pull/3933

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?
Enable the “gated” repo feature and review each change upfront

References

Credits

  • Daniel Kilimnik @D_K_Dev (Neodyme AG)
  • Felipe Custodio Romero @localo (Neodyme AG)

Affected configurations

Vulners
Node
go.woodpecker-ci.orgwoodpeckerRange<2.7.0
OR
woodpeckerv2Range<2.7.0
VendorProductVersionCPE
go.woodpecker-ci.orgwoodpecker*cpe:2.3:a:go.woodpecker-ci.org:woodpecker:*:*:*:*:*:*:*:*
woodpeckerv2*cpe:2.3:a:woodpecker:v2:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.6%

Related for GHSA-XW35-RRCP-G7XM