Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0908 | github-slug-action is a GitHub Action to expose slug value of GitHub environment variables inside of one's GitHub workflow. Starting in version 4.0.0` and prior to version 4.4.1, this action uses the `github.head_ref` parameter in an insecure way. This vulnerability can be triggered by any user on GitHub on any workflow using the action on pull requests. They just need to create a pull request with a branch name, which can contain the attack payload. This can be used to execute code on the GitHub runners and to exfiltrate any secrets one uses in the CI pipeline. A patched action is available in version 4.4.1. No workaround is available. |
Github GHSA |
GHSA-6q4m-7476-932w | github-slug-action vulnerable to arbitrary code execution |
Tue, 25 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T14:58:17.504Z
Reserved: 2023-03-04T01:03:53.633Z
Link: CVE-2023-27581
Updated: 2024-08-02T12:16:35.956Z
Status : Modified
Published: 2023-03-13T21:15:14.037
Modified: 2024-11-21T07:53:11.620
Link: CVE-2023-27581
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA