CVE-2023-30628

Source
https://cve.org/CVERecord?id=CVE-2023-30628
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30628.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-30628
Aliases
Published
2023-04-24T21:17:32.896Z
Modified
2026-02-07T04:24:14.314772Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Kiwi TCMS has command injection vulnerability in changelog.yml CI workflow
Details

Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and kiwitcms/enterprise v12.2 and prior, the changelog.yml workflow is vulnerable to command injection attacks because of using an untrusted github.head_ref field. The github.head_ref value is an attacker-controlled value. Assigning the value to zzz";echo${IFS}"hello";# can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. Commit 834c86dfd1b2492ccad7ebbfd6304bfec895fed2 of the kiwitcms/Kiwi repository and commit e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751 of the kiwitcms/enterprise repository contain a fix for this issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30628.json",
    "cwe_ids": [
        "CWE-78"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/kiwitcms/kiwi

Affected ranges

Type
GIT
Repo
https://github.com/kiwitcms/kiwi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

tcms-api-1.*
tcms-api-1.4.0
tcms-api-1.5.0
tcms-api-1.5.1
tcms-api-4.*
tcms-api-4.0.0
tcms-api-4.2
tcms-api-5.*
tcms-api-5.0
tcms-api-5.1
tcms-api-5.2
tcms-api-5.3
v10.*
v10.0
v10.1
v10.2
v10.3
v10.4
v10.5
v11.*
v11.0
v11.1
v11.2
v11.3
v11.4
v11.5
v11.6
v11.7
v12.*
v12.0
v12.1
v12.2
v3.*
v3.21.1
v3.21.2
v3.22
v3.23
v3.26
v3.28
v3.30
v3.32
v3.33
v3.37
v3.38
v3.39
v3.41
v3.44
v3.48
v3.49
v3.50
v3.8.17-1
v3.8.18
v3.8.18.21
v4.*
v4.0.0
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.2
v5.*
v5.0
v5.1
v5.2
v5.3
v5.3.1
v6.*
v6.0
v6.0.1
v6.1
v6.1.1
v6.10
v6.11
v6.2
v6.2.1
v6.3
v6.4
v6.5.1
v6.5.2
v6.5.3
v6.6
v6.7
v6.8
v6.9
v7.*
v7.0
v7.1
v7.2
v7.2.1
v7.3
v8.*
v8.0
v8.1
v8.2
v8.3
v8.4
v8.5
v8.6
v8.6.1
v8.7
v8.8
v8.9
v9.*
v9.0
v9.0.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30628.json"