CVE-2024-42471 – Arbitrary File Write via artifact extraction in actions/artifact
https://notcve.org/view.php?id=CVE-2024-42471
actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. • https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3 https://github.com/actions/toolkit/pull/1724 https://snyk.io/research/zip-slip-vulnerability • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-35954 – Delimiter injection vulnerability in @actions/core exportVariable
https://notcve.org/view.php?id=CVE-2022-35954
The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to `@actions/core v1.9.1`. If you are unable to upgrade the `@actions/core` package, you can modify your action to ensure that any user input does not contain the delimiter `_GitHubActionsFileCommandDelimeter_` before calling `core.exportVariable`. • https://github.com/actions/toolkit/commit/4beda9cbc00ba6eefe387a937c21087ccb8ee9df https://github.com/actions/toolkit/security/advisories/GHSA-7r3h-m5j6-3q42 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2020-15228 – Environment Variable Injection in GitHub Actions
https://notcve.org/view.php?id=CVE-2020-15228
In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution. • https://github.com/guettli/fix-CVE-2020-15228 http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2014-2029
https://notcve.org/view.php?id=CVE-2014-2029
The automatic version check functionality in the tools in Percona Toolkit 2.1 allows man-in-the-middle attackers to obtain sensitive information or execute arbitrary code by leveraging use of HTTP to download configuration information from v.percona.com. La funcionalidad de chequeo de versiones automático en las herramientas de Percona Toolkit 2.1 permite a los atacantes Man-in-the-Middle (MitM) obtener información sensible o ejecutar código arbitrario usando HTTP para descargar información de configuración de v.percona.com. • http://www.openwall.com/lists/oss-security/2014/02/19/14 https://bugs.launchpad.net/percona-toolkit/+bug/1279502 https://bugzilla.novell.com/show_bug.cgi?id=864194 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-1027
https://notcve.org/view.php?id=CVE-2015-1027
The version checking subroutine in percona-toolkit before 2.2.13 and xtrabackup before 2.2.9 was vulnerable to silent HTTP downgrade attacks and Man In The Middle attacks in which the server response could be modified to allow the attacker to respond with modified command payload and have the client return additional running configuration information leading to an information disclosure of running configuration of MySQL. La subrutina de chequeo de versiones en percona-toolkit en versiones anteriores a la 2.2.13 y xtrabackup en versiones anteriores a la 2.2.9 era vulnerable a ataques silenciosos de degradación HTTP y Man-in-the-Middle (MitM) en los que la respuesta del servidor se podría modificar para que permita que el atacante responda con una carga útil de comandos modificada y fuerce a que el cliente devuelva información adicional de la configuración que se está ejecutando, lo cual provocaría la revelación de información de la configuración actual de MySQL. • https://bugs.launchpad.net/percona-toolkit/+bug/1408375 https://www.percona.com/blog/2015/05/06/percona-security-advisory-cve-2015-1027 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •