Lucene search

K
hackeroneRyotakH1:1762025
HistoryNov 04, 2022 - 12:21 a.m.

GitHub: Improper handling of null bytes in GitHub Actions Runner allows an attacker to set arbitrary environment variables

2022-11-0400:21:30
ryotak
hackerone.com
8
github
actions
runner
code injection
vulnerability
enterprise server
windows
exploit
permission
environment variables
bug bounty program

0.002 Low

EPSS

Percentile

55.8%

A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.

0.002 Low

EPSS

Percentile

55.8%

Related for H1:1762025