Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Shell-injection in git-tag-annotation GitHub action
Vulnerability Description
In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version 1.0.1. If you don't use the `tag` input you are most likely safe. The `GITHUB_REF` environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the `tag` input and cannot upgrade to `> 1.0.0` make sure that the value is not controlled by another Action.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
git-tag-annotation-action 操作系统命令注入漏洞
Vulnerability Description
Git是一套免费、开源的分布式版本控制系统。 git-tag-annotation-action (open source GitHub Action) 1.0.1 之前版本存在操作系统命令注入漏洞,该漏洞使攻击者可以执行任意的shell命令,如果他们可以控制[the `tag` input]的值或修改 [the `GITHUB_REF` environment variable]的值。
CVSS Information
N/A
Vulnerability Type
N/A