First published: Sat Aug 13 2022(Updated: )
The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to `@actions/core v1.9.1`. If you are unable to upgrade the `@actions/core` package, you can modify your action to ensure that any user input does not contain the delimiter `_GitHubActionsFileCommandDelimeter_` before calling `core.exportVariable`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Github Toolkit | <1.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35954 is a vulnerability in the GitHub Actions Toolkit that allows attackers to assign values to arbitrary variables by breaking out of a specific variable using a well-known delimiter.
CVE-2022-35954 has a severity of medium with a severity value of 5.
The affected software version for CVE-2022-35954 is GitHub Toolkit 1.9.1 (Node.js).
To fix CVE-2022-35954, update to a version of GitHub Toolkit above 1.9.1.
Yes, you can find additional information about CVE-2022-35954 in the GitHub Advisory GHSA-7r3h-m5j6-3q42.