漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Shell-injection in git-tag-annotation GitHub action
Vulnerability Description
In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version 1.0.1. If you don't use the `tag` input you are most likely safe. The `GITHUB_REF` environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the `tag` input and cannot upgrade to `> 1.0.0` make sure that the value is not controlled by another Action.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
git-tag-annotation-action 操作系统命令注入漏洞
Vulnerability Description
Git是一套免费、开源的分布式版本控制系统。 git-tag-annotation-action (open source GitHub Action) 1.0.1 之前版本存在操作系统命令注入漏洞,该漏洞使攻击者可以执行任意的shell命令,如果他们可以控制[the `tag` input]的值或修改 [the `GITHUB_REF` environment variable]的值。
CVSS Information
N/A
Vulnerability Type
N/A