Vulnerability Description
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. In versions 2.10.0 and prior, Litestar's `docs-preview.yml` workflow is vulnerable to Environment Variable injection which may lead to secret exfiltration and repository manipulation. This issue grants a malicious actor the permission to write issues, read metadata, and write pull requests. In addition, the `DOCS_PREVIEW_DEPLOY_TOKEN` is exposed to the attacker. Commit 84d351e96aaa2a1338006d6e7221eded161f517b contains a fix for this issue.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/litestar-org/litestar/actions/runs/10081936962/job/2787507766
- https://github.com/litestar-org/litestar/blob/ffaf5616b19f6f0f4128209c8b49dbcb41
- https://github.com/litestar-org/litestar/commit/84d351e96aaa2a1338006d6e7221eded
- https://github.com/litestar-org/litestar/security/advisories/GHSA-4hq2-rpgc-r8r7
FAQ
What is CVE-2024-42370?
CVE-2024-42370 is a vulnerability with a CVSS score of 8.3 (HIGH). Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. In versions 2.10.0 and prior, Litestar's `docs-preview.yml` workflow is vulnerable to Environment Variable injection which may le...
How severe is CVE-2024-42370?
CVE-2024-42370 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-42370?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.