CVE-2022-39326

high

Description

kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build.

References

https://github.com/kartverket/github-workflows/security/advisories/GHSA-f9qj-7gh3-mhj4

https://github.com/kartverket/github-workflows/releases/tag/v2.7.5

https://github.com/kartverket/github-workflows/pull/19

Details

Source: Mitre, NVD

Published: 2022-10-25

Updated: 2022-10-28

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High