chore(deps): update tj-actions/changed-files action to v40 [security] - autoclosed #1954
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v39
->v40
GitHub Vulnerability Alerts
CVE-2023-51664
Summary
The
tj-actions/changed-files
workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets.Details
The
changed-files
action returns a list of files changed in a commit or pull request which provides anescape_json
input enabled by default, only escapes"
for JSON values.This could potentially allow filenames that contain special characters such as
;
and ` (backtick) which can be used by an attacker to take over the GitHub Runner if the output value is used in a raw fashion (thus being directly replaced before execution) inside arun
block. By running custom commands an attacker may be able to steal secrets such asGITHUB_TOKEN
if triggered on other events thanpull_request
. For example onpush
.Proof of Concept
$(whoami).txt
which is a valid filename.List all changed files
step below.Example output:
Impact
This issue may lead to arbitrary command execution in the GitHub Runner.
Resolution
A new
safe_output
input would be enabled by default and return filename paths escaping special characters like ;, ` (backtick), $, (), etc for bash environments.A safe recommendation of using environment variables to store unsafe outputs.
Resources
Release Notes
tj-actions/changed-files (tj-actions/changed-files)
v40
Compare Source
Changes in v40.2.3
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.2.3
Changes in v40.2.2
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.2.2
Changes in v40.2.1
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.2.1
Changes in v40.2.0
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.2.0
Changes in v40.1.1
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.1.1
Changes in v40.1.0
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.1.0
Changes in v40.0.2
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.0.2
Changes in v40.0.1
What's Changed
Full Changelog: tj-actions/changed-files@v40...v40.0.1
Changes in v40.0.0
🔥 🔥 Breaking Change 🔥 🔥
What's Changed
Full Changelog: tj-actions/changed-files@v39...v40.0.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.