Vulnerability Description
tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tj-Actions | Branch-Names | < 7.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/tj-actions/branch-names/commit/4923d1ca41f928c24f1c1b3af9daaaPatch
- https://github.com/tj-actions/branch-names/commit/6c999acf206f5561e19f46301bb310Patch
- https://github.com/tj-actions/branch-names/commit/726fe9ba5e9da4fcc716223b7994ffPatch
- https://github.com/tj-actions/branch-names/security/advisories/GHSA-8v8w-v8xg-79ExploitVendor Advisory
- https://securitylab.github.com/research/github-actions-untrusted-inputExploitThird Party Advisory
- https://github.com/tj-actions/branch-names/commit/4923d1ca41f928c24f1c1b3af9daaaPatch
- https://github.com/tj-actions/branch-names/commit/6c999acf206f5561e19f46301bb310Patch
- https://github.com/tj-actions/branch-names/commit/726fe9ba5e9da4fcc716223b7994ffPatch
- https://github.com/tj-actions/branch-names/security/advisories/GHSA-8v8w-v8xg-79ExploitVendor Advisory
- https://securitylab.github.com/research/github-actions-untrusted-inputExploitThird Party Advisory
FAQ
What is CVE-2023-49291?
CVE-2023-49291 is a vulnerability with a CVSS score of 9.3 (CRITICAL). tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_reques...
How severe is CVE-2023-49291?
CVE-2023-49291 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-49291?
Check the references section above for vendor advisories and patch information. Affected products include: Tj-Actions Branch-Names.