Vulnerability Details : CVE-2023-34112
Potential exploit
JavaCPP Presets is a project providing Java distributions of native C++ libraries. All the actions in the `bytedeco/javacpp-presets` use the `github.event.head_commit.message?` parameter in an insecure way. For example, the commit message is used in a run statement - resulting in a command injection vulnerability due to string interpolation. No exploitation has been reported. This issue has been addressed in version 1.5.9. Users of JavaCPP Presets are advised to upgrade as a precaution.
Products affected by CVE-2023-34112
- cpe:2.3:a:bytedeco:javacpp_presets:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-34112
9.86%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-34112
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2023-34112
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-34112
-
https://securitylab.github.com/research/github-actions-untrusted-input/
Keeping your GitHub Actions and workflows secure Part 2: Untrusted input | GitHub Security LabExploit;Third Party Advisory
-
https://github.com/bytedeco/javacpp-presets/security/advisories/GHSA-36rx-hq22-jm5x
Github Action Vulnerability · Advisory · bytedeco/javacpp-presets · GitHubVendor Advisory
Jump to