cve/2023/CVE-2023-49291.md

18 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-49291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49291)
![](https://img.shields.io/static/v1?label=Product&message=branch-names&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%207.0.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen)
### Description
tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://securitylab.github.com/research/github-actions-untrusted-input
#### Github
No PoCs found on GitHub currently.