CVE-2022-35954

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-35954
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35954.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-35954
Aliases
Related
Published
2022-08-15T11:21:39Z
Modified
2025-01-08T14:15:32.131755Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The core.exportVariable function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the GITHUB_ENV file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to @actions/core v1.9.1. If you are unable to upgrade the @actions/core package, you can modify your action to ensure that any user input does not contain the delimiter _GitHubActionsFileCommandDelimeter_ before calling core.exportVariable.

References

Affected packages

Git / github.com/actions/toolkit

Affected ranges

Type
GIT
Repo
https://github.com/actions/toolkit
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.0.0
0.0.1
0.0.2

@actions/core@1.*

@actions/core@1.0.0
@actions/core@1.1.0

@actions/exec@1.*

@actions/exec@1.0.0
@actions/exec@1.0.1

@actions/github@1.*

@actions/github@1.0.0
@actions/github@1.1.0

@actions/io@1.*

@actions/io@1.0.0
@actions/io@1.0.1

@actions/tool-cache@1.*

@actions/tool-cache@1.0.0
@actions/tool-cache@1.1.1