// For flags

CVE-2020-15272

Shell-injection in git-tag-annotation GitHub action

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version 1.0.1. If you don't use the `tag` input you are most likely safe. The `GITHUB_REF` environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the `tag` input and cannot upgrade to `> 1.0.0` make sure that the value is not controlled by another Action.

En la git-tag-annotation-action (GitHub Action de código abierto) versiones anteriores a 1.0.1, un atacante puede ejecutar comandos de shell arbitrarios (*) si puede controlar el valor de [the "tag" input] o lograr alterar la valor de [the "GITHUB_REF" environment variable]. El problema ha sido parcheado en la versión 1.0.1. Si no usa la entrada "tag", lo más probable es que esté seguro. La variable de entorno "GITHUB_REF" está protegida por el entorno de GitHub Actions, por lo que los ataques desde allí deberían ser imposibles. Si debe utilizar la entrada "tag" y no puede actualizar a "versiones posteriores a 1.0.0", asegúrese de que el valor no esté controlado por otra Acción

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-06-25 CVE Reserved
  • 2020-10-26 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Git-tag-annotation-action Project
Search vendor "Git-tag-annotation-action Project"
Git-tag-annotation-action
Search vendor "Git-tag-annotation-action Project" for product "Git-tag-annotation-action"
< 1.0.1
Search vendor "Git-tag-annotation-action Project" for product "Git-tag-annotation-action" and version " < 1.0.1"
-
Affected