First published: Mon Nov 09 2020(Updated: )
The execute function in in the Atlassian gajira-comment GitHub Action before version 2.0.2 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue comment.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Comment | <2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14189 is classified as a critical vulnerability due to its ability to allow arbitrary code execution.
To fix CVE-2020-14189, update the Atlassian gajira-comment GitHub Action to version 2.0.2 or later.
CVE-2020-14189 can be exploited by remote attackers through crafted GitHub issue comments.
Users of the Atlassian gajira-comment GitHub Action prior to version 2.0.2 are affected by CVE-2020-14189.
The impact of CVE-2020-14189 is that it may allow attackers to execute arbitrary code in the context of a GitHub runner.