Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0385 | tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade. |
Github GHSA |
GHSA-mcph-m25j-8j63 | tj-actions/changed-files has Potential Actions command injection in output filenames (GHSL-2023-271) |
Wed, 25 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-25T20:17:19.352Z
Reserved: 2023-12-21T14:14:26.224Z
Link: CVE-2023-51664
Updated: 2024-08-02T22:40:34.150Z
Status : Modified
Published: 2023-12-27T17:15:08.340
Modified: 2024-11-21T08:38:33.600
Link: CVE-2023-51664
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA