logo

CVE-2023-23939 azure/setup-kubectl

Package

Manager: github_actions
Name: azure/setup-kubectl
Vulnerable Version: >=0 <3

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N

EPSS: 0.00304 pctl0.53123

Details

Azure/setup-kubectl: Escalation of privilege vulnerability for v3 and lower ### Impact This vulnerability only impacts versions `v2` and lower. An insecure temporary creation of a file allows other actors on the Actions runner to replace the Kubectl binary created by this action because it is world writable. This Kubectl tool installer runs `fs.chmodSync(kubectlPath, 777)` to set permissions on the Kubectl binary, however, this allows any local user to replace the Kubectl binary. This allows privilege escalation to the user that can also run kubectl, most likely root. This attack is only possible if an attacker somehow breached the GitHub actions runner or if a user is utilizing an Action that maliciously executes this attack. No impacted customers have been reported. ### Patches This has been fixed and released in all versions `v3` and later. 755 permissions are used instead. ### Workarounds If users absolutely cannot upgrade to `v3` or higher than they should be extra diligent of the other GitHub actions they are using in a workflow and ensure that their GitHub actions runner is secure.

Metadata

Created: 2023-03-07T20:07:27Z
Modified: 2023-03-07T20:07:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-p756-rfxh-x63h/GHSA-p756-rfxh-x63h.json
CWE IDs: ["CWE-732"]
Alternative ID: GHSA-p756-rfxh-x63h
Finding: F039
Auto approve: 1