Overview
- Description
- tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- security-advisories@github.com
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tj-actions:branch-names:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AB0A58B-E056-49E3-9CD4-063AF78D1ECB", "versionEndExcluding": "7.0.0" }, { "criteria": "cpe:2.3:a:tj-actions:branch-names:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04A7066A-CDAB-4C39-AD1F-87ADAF23495A", "versionEndExcluding": "7.0.7", "versionStartIncluding": "7.0.1" } ], "operator": "OR" } ] } ]