CVE-2023-31128

NextCloud Cookbook is a recipe library app. Prior to commit a46d9855 on the `master` branch and commit 489bb744 on the `main-0.9.x` branch, the `pull-checks.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz";echo${IFS}"hello";#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. This issue is fixed in commit a46d9855 on the `master` branch and commit 489bb744 on the `main-0.9.x` branch. There is no risk for the user of the app within the NextCloud server. This only affects the main repository and possible forks of it. Those who have forked the NextCloud Cookbook repository should make sure their forks are on the latest version to prevent code injection attacks and similar.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:cookbook:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.1
References () https://github.com/nextcloud/cookbook/blob/a14d6ffc4d45e1447556f68606129dfd6c1505cf/.github/workflows/pull-checks.yml#L67 - Product () https://github.com/nextcloud/cookbook/blob/a14d6ffc4d45e1447556f68606129dfd6c1505cf/.github/workflows/pull-checks.yml#L67 - Product
References () https://github.com/nextcloud/cookbook/commit/489bb744 - Patch () https://github.com/nextcloud/cookbook/commit/489bb744 - Patch
References () https://github.com/nextcloud/cookbook/commit/a46d98559e2c64292da9ffb06138cccc2e50ae1b - Patch () https://github.com/nextcloud/cookbook/commit/a46d98559e2c64292da9ffb06138cccc2e50ae1b - Patch
References () https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h - Vendor Advisory () https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h - Vendor Advisory
References () https://securitylab.github.com/research/github-actions-untrusted-input/ - Exploit, Third Party Advisory () https://securitylab.github.com/research/github-actions-untrusted-input/ - Exploit, Third Party Advisory

05 Jun 2023, 14:15

Type Values Removed Values Added
CPE cpe:2.3:a:nextcloud:cookbook:*:*:*:*:*:*:*:*
References (MISC) https://github.com/nextcloud/cookbook/commit/a46d98559e2c64292da9ffb06138cccc2e50ae1b - (MISC) https://github.com/nextcloud/cookbook/commit/a46d98559e2c64292da9ffb06138cccc2e50ae1b - Patch
References (MISC) https://github.com/nextcloud/cookbook/blob/a14d6ffc4d45e1447556f68606129dfd6c1505cf/.github/workflows/pull-checks.yml#L67 - (MISC) https://github.com/nextcloud/cookbook/blob/a14d6ffc4d45e1447556f68606129dfd6c1505cf/.github/workflows/pull-checks.yml#L67 - Product
References (MISC) https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h - (MISC) https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h - Vendor Advisory
References (MISC) https://securitylab.github.com/research/github-actions-untrusted-input/ - (MISC) https://securitylab.github.com/research/github-actions-untrusted-input/ - Exploit, Third Party Advisory
References (MISC) https://github.com/nextcloud/cookbook/commit/489bb744 - (MISC) https://github.com/nextcloud/cookbook/commit/489bb744 - Patch
First Time Nextcloud cookbook
Nextcloud
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-78

26 May 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-26 22:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31128

Mitre link : CVE-2023-31128

CVE.ORG link : CVE-2023-31128


JSON object : View

Products Affected

nextcloud

  • cookbook
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')