-
-
Notifications
You must be signed in to change notification settings - Fork 8.9k
ci: fix RCE vulnerability in file overwrite #10985
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Size ReportBundles
Usages
|
|
It was an pleasure to help :-) |
vuejs/core#10985 Special thanks to @redyetidev
|
out of curiosity, what is wrong with |
|
To link these workflows, we need to pass the target PR number as an argument to the trusted environment via artifacts. |
|
Sure yes the environments are different, but to me it looks like in my mind replacing with should have the same end result without having to upload the pr number in workflow a) and then downloading it in workflow b) |
|
Did you try it? IIRC, it doesn't work. According to GitHub Docs, Webhook event payload is |
|
I haven't that's why I first asked if i missed anything. I can give it a shot later, the webhook event payload also seems to have an array of objects named |
|
As far as I know, |
Special thanks to @redyetidev
Critical RCE Vulnerability:
An attacker can exploit this vulnerability by uploading files named
scripts/size-report.ts, which will overwrite the existing file and subsequently execute the injected code.This flaw grants the attacker the ability to execute arbitrary code in a secure environment that has write permissions to both
pull-requestsandissues.Special thanks to @redyetidev