CVE-2023-31128
CVSS 3.1 Score 8.8 of 10 (high)
Details
Summary
CVE-2023-31128: NextCloud Cookbook's `pull-checks.yml` workflow was found vulnerable to command injection attacks prior to commits a46d9855 on the `master` branch and 489bb744 on the `main-0.9.x` branch. The vulnerability stemmed from the use of an untrusted `github.head_ref` field, which is an attacker-controlled value. Assigning the value to malicious commands like `"zzz";echo${IFS}"hello";#` could result in command execution. The attacker was granted write-access to the repository, enabling them to exploit the flaw. This issue has been rectified with the aforementioned commits, and users of the NextCloud app are not affected. However, forks of the NextCloud Cookbook repository are at risk and should be updated to the latest version to mitigate this threat.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Vendors
- Nextcloud GmbH