Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-26493
HistoryMar 27, 2023 - 10:15 p.m.

Command injection

2023-03-2722:15:00
PRIOn knowledge base
www.prio-n.com
3
cocos engine
open-source
framework
command injection
web-interface-check.yml
github runner
takeover
potential
repository
removed
actions
users

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.3%

Cocos Engine is an open-source framework for building 2D & 3D real-time rendering and interactive content. In the github repo for Cocos Engine the web-interface-check.yml was subject to command injection. The web-interface-check.yml was triggered when a pull request was opened or updated and contained the user controllable field (${{ github.head_ref }} – the name of the fork’s branch). This would allow an attacker to take over the GitHub Runner and run custom commands (potentially stealing secrets such as GITHUB_TOKEN) and altering the repository. The workflow has since been removed for the repository. There are no actions required of users.

CPENameOperatorVersion
cocos-engineeq< 2023220

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.3%

Related for PRION:CVE-2023-26493