
We found results for “”
CVE-2020-15272
Date: October 26, 2020
In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the "tag" input] or manage to alter the value of [the "GITHUB_REF" environment variable]. The problem has been patched in version 1.0.1. If you don't use the "tag" input you are most likely safe. The "GITHUB_REF" environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the "tag" input and cannot upgrade to "> 1.0.0" make sure that the value is not controlled by another Action.
Language: JS
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-78CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | REQUIRED |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | SINGLE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |