CVE-2022-39326 – kartverket/github-workflows
Package
Manager: github_actions
Name: kartverket/github-workflows
Vulnerable Version: >=0 <2.7.5
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0026 pctl0.49124
Details
run-terraform allows for RCE via terraform plan ### Impact _What kind of vulnerability is it? Who is impacted?_ All users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Upgrade to at least 2.7.5 to resolve the issue. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Until you are able to upgrade, make sure to review any PRs from exernal users for malicious payloads before allowing them to trigger a build. ### For more information If you have any questions or comments about this advisory: * Open an issue in [kartverket/github-workflows](https://github.com/kartverket/github-workflows)
Metadata
Created: 2022-10-19T18:54:28Z
Modified: 2022-10-25T20:30:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-f9qj-7gh3-mhj4/GHSA-f9qj-7gh3-mhj4.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-f9qj-7gh3-mhj4
Finding: F422
Auto approve: 1