Lucene search

K
osvGoogleOSV:GHSA-XW35-RRCP-G7XM
HistoryJul 19, 2024 - 7:59 p.m.

Woodpecker's custom workspace allow to overwrite plugin entrypoint executable

2024-07-1919:59:08
Google
osv.dev
6
woodpecker
custom workspace
plugin entrypoint
server takeover
secrets extraction
patches
workaround
security advisory
neodyme ag
daniel kilimnik
felipe custodio romero

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.6%

Impact

The server allow to create any user who can trigger a pipeline run malicious workflows:

  • Those workflows can either lead to a host takeover that runs the agent executing the workflow.
  • Or allow to extract the secrets who would be normally provided to the plugins who’s entrypoint are overwritten.

Patches

https://github.com/woodpecker-ci/woodpecker/pull/3933

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?
Enable the “gated” repo feature and review each change upfront

References

Credits

  • Daniel Kilimnik @D_K_Dev (Neodyme AG)
  • Felipe Custodio Romero @localo (Neodyme AG)

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.6%

Related for OSV:GHSA-XW35-RRCP-G7XM