A command injection vulnerability exists in the deploy+test-visual.yml workflow of the gradio-app/gradio repository, due to improper neutralization of special elements used in a command. This vulnerability allows attackers to execute unauthorized commands, potentially leading to unauthorized modification of the base repository or secrets exfiltration. The issue arises from the unsafe handling of GitHub context information within a `run` operation, where expressions inside `${{ }}` are evaluated and substituted before script execution. Remediation involves setting untrusted input values to intermediate environment variables to prevent direct influence on script generation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-03-27T15:54:27.999Z
Updated: 2024-08-21T14:52:17.246Z
Reserved: 2024-02-15T16:21:32.627Z
Link: CVE-2024-1540
Vulnrichment
Updated: 2024-08-01T18:40:21.352Z
NVD
Status : Awaiting Analysis
Published: 2024-03-27T16:15:09.963
Modified: 2024-04-16T12:15:09.617
Link: CVE-2024-1540
Redhat
No data.