You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The core.exportVariable function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the GITHUB_ENV file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to @actions/core v1.9.1. If you are unable to upgrade the @actions/core package, you can modify your action to ensure that any user input does not contain the delimiter _GitHubActionsFileCommandDelimeter_ before calling core.exportVariable.
In the @actions/core npm module before version 1.2.6,addPath and exportVariable functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the set-env and add-path workflow commands in the near future. For now, users should upgrade to @actions/core v1.2.6 or later, and replace any instance of the set-env or add-path commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.
mend-for-github-combot
changed the title
core-1.1.1.tgz: 1 vulnerabilities (highest severity is: 5.0)
core-1.1.1.tgz: 2 vulnerabilities (highest severity is: 5.0)
Aug 18, 2022
Vulnerable Library - core-1.1.1.tgz
Actions core lib
Library home page: https://registry.npmjs.org/@actions/core/-/core-1.1.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/@actions/core/package.json
Found in HEAD commit: 364daf693029da49644d5e0346a6c949716dc529
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-35954
Vulnerable Library - core-1.1.1.tgz
Actions core lib
Library home page: https://registry.npmjs.org/@actions/core/-/core-1.1.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/@actions/core/package.json
Dependency Hierarchy:
Found in HEAD commit: 364daf693029da49644d5e0346a6c949716dc529
Found in base branch: main
Vulnerability Details
The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The
core.exportVariable
function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to theGITHUB_ENV
file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to@actions/core v1.9.1
. If you are unable to upgrade the@actions/core
package, you can modify your action to ensure that any user input does not contain the delimiter_GitHubActionsFileCommandDelimeter_
before callingcore.exportVariable
.Publish Date: 2022-08-13
URL: CVE-2022-35954
CVSS 3 Score Details (5.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35954
Release Date: 2022-08-15
Fix Resolution: 1.9.1
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2020-15228
Vulnerable Library - core-1.1.1.tgz
Actions core lib
Library home page: https://registry.npmjs.org/@actions/core/-/core-1.1.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/@actions/core/package.json
Dependency Hierarchy:
Found in HEAD commit: 364daf693029da49644d5e0346a6c949716dc529
Found in base branch: main
Vulnerability Details
In the
@actions/core
npm module before version 1.2.6,addPath
andexportVariable
functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables theset-env
andadd-path
workflow commands in the near future. For now, users should upgrade to@actions/core v1.2.6
or later, and replace any instance of theset-env
oradd-path
commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.Publish Date: 2020-10-01
URL: CVE-2020-15228
CVSS 3 Score Details (3.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-mfwh-5m23-j46w
Release Date: 2020-10-01
Fix Resolution: 1.2.6
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: