Vulnerability Details : CVE-2023-34111
Potential exploit
The `Release PR Merged` workflow in the github repo taosdata/grafanaplugin is subject to a command injection vulnerability which allows for arbitrary code execution within the github action context due to the insecure usage of `${{ github.event.pull_request.title }}` in a bash command within the GitHub workflow. Attackers can inject malicious commands which will be executed by the workflow. This happens because `${{ github.event.pull_request.title }}` is directly passed to bash command on like 25 of the workflow. This may allow an attacker to gain access to secrets which the github action has access to or to otherwise make use of the compute resources.
Vulnerability category: Input validation
Products affected by CVE-2023-34111
- cpe:2.3:a:tdengine:grafana:*:*:*:*:*:tdengine:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-34111
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-34111
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
2.8
|
5.2
|
GitHub, Inc. |
CWE ids for CVE-2023-34111
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Secondary)
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-34111
-
https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr
Command Injection Vulnerability in `Release PR Merged` Workflow · Advisory · taosdata/grafanaplugin · GitHubExploit;Third Party Advisory
-
https://securitylab.github.com/research/github-actions-untrusted-input/
Keeping your GitHub Actions and workflows secure Part 2: Untrusted input | GitHub Security LabExploit;Third Party Advisory
-
https://github.com/taosdata/grafanaplugin/blob/master/.github/workflows/release-pr-merged.yaml#L25
grafanaplugin/release-pr-merged.yaml at master · taosdata/grafanaplugin · GitHubProduct
Jump to