8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse dismissed (not in Nixpkgs)
OWASP BLT has RCE in Github Actions via untrusted Django model execution in workflow
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Versions prior to 2.1.1 contain an RCE vulnerability in the .github/workflows/regenerate-migrations.yml workflow. The workflow uses the pull_request_target trigger to run with full GITHUB_TOKEN write permissions, copies attacker-controlled files from untrusted pull requests into the trusted runner workspace via git show, and then executes python manage.py makemigrations, which imports Django model modules including attacker-controlled website/models.py at runtime. Any module-level Python code in the attacker's models.py is executed during import, enabling arbitrary code execution in the privileged CI environment with access to GITHUB_TOKEN and repository secrets. The attack is triggerable by any external contributor who can open a pull request, provided a maintainer applies the regenerate-migrations label, potentially leading to secret exfiltration, repository compromise, and supply chain attacks. A patch for this issue is expected to be released in version 2.1.1.
References
-
https://github.com/OWASP-BLT/BLT/security/advisories/GHSA-wxm3-64fx-cmx9 x_refsource_CONFIRM
Affected products
- ==<= 2.1
Matching in nixpkgs
pkgs.libltc
POSIX-C Library for handling Linear/Logitudinal Time Code (LTC)
pkgs.ocamlPackages.labltk
OCaml interface to Tcl/Tk, including OCaml library explorer OCamlBrowser
pkgs.ocamlPackages_latest.labltk
OCaml interface to Tcl/Tk, including OCaml library explorer OCamlBrowser
Package maintainers
-
@vbgl Vincent Laporte <Vincent.Laporte@gmail.com>