icon

We found results for “

CVE-2020-15272

Date: October 26, 2020

In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the "tag" input] or manage to alter the value of [the "GITHUB_REF" environment variable]. The problem has been patched in version 1.0.1. If you don't use the "tag" input you are most likely safe. The "GITHUB_REF" environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the "tag" input and cannot upgrade to "> 1.0.0" make sure that the value is not controlled by another Action.

Language: JS

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-78

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): SINGLE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us