Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3251 | StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch. |
Github GHSA |
GHSA-g85v-wf27-67xc | Harden-Runner has a command injection weaknesses in `setup.ts` and `arc-runner.ts` |
Fri, 22 Nov 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 19 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Step Security
Step Security harden Runner |
|
| CPEs | cpe:2.3:a:step_security:harden_runner:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Step Security
Step Security harden Runner |
|
| Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch. | |
| Title | Harden-Runner has command injection weaknesses in `setup.ts` and `arc-runner.ts` | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-19T14:38:08.418Z
Reserved: 2024-11-14T15:05:46.766Z
Link: CVE-2024-52587
Updated: 2024-11-19T14:37:46.084Z
Status : Deferred
Published: 2024-11-18T22:15:09.557
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-52587
OpenCVE Enrichment
No data.
EUVD
Github GHSA