CVE-2023-51664

tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tj-actions:changed-files:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:38

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.3
References () https://github.com/tj-actions/changed-files/commit/0102c07446a3cad972f4afcbd0ee4dbc4b6d2d1b - Patch () https://github.com/tj-actions/changed-files/commit/0102c07446a3cad972f4afcbd0ee4dbc4b6d2d1b - Patch
References () https://github.com/tj-actions/changed-files/commit/716b1e13042866565e00e85fd4ec490e186c4a2f - Patch () https://github.com/tj-actions/changed-files/commit/716b1e13042866565e00e85fd4ec490e186c4a2f - Patch
References () https://github.com/tj-actions/changed-files/commit/ff2f6e6b91913a7be42be1b5917330fe442f2ede - Patch () https://github.com/tj-actions/changed-files/commit/ff2f6e6b91913a7be42be1b5917330fe442f2ede - Patch
References () https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 - Exploit, Vendor Advisory () https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 - Exploit, Vendor Advisory

04 Jan 2024, 16:57

Type Values Removed Values Added
CWE CWE-77
First Time Tj-actions changed-files
Tj-actions
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/tj-actions/changed-files/commit/ff2f6e6b91913a7be42be1b5917330fe442f2ede - () https://github.com/tj-actions/changed-files/commit/ff2f6e6b91913a7be42be1b5917330fe442f2ede - Patch
References () https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 - () https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 - Exploit, Vendor Advisory
References () https://github.com/tj-actions/changed-files/commit/0102c07446a3cad972f4afcbd0ee4dbc4b6d2d1b - () https://github.com/tj-actions/changed-files/commit/0102c07446a3cad972f4afcbd0ee4dbc4b6d2d1b - Patch
References () https://github.com/tj-actions/changed-files/commit/716b1e13042866565e00e85fd4ec490e186c4a2f - () https://github.com/tj-actions/changed-files/commit/716b1e13042866565e00e85fd4ec490e186c4a2f - Patch
CPE cpe:2.3:a:tj-actions:changed-files:*:*:*:*:*:*:*:*

27 Dec 2023, 18:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-27 17:15

Updated : 2024-11-21 08:38


NVD link : CVE-2023-51664

Mitre link : CVE-2023-51664

CVE.ORG link : CVE-2023-51664


JSON object : View

Products Affected

tj-actions

  • changed-files
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')