StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch.
History

Tue, 19 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Step Security
Step Security harden Runner
CPEs cpe:2.3:a:step_security:harden_runner:*:*:*:*:*:*:*:*
Vendors & Products Step Security
Step Security harden Runner
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 18 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Description StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch.
Title Harden-Runner has command injection weaknesses in `setup.ts` and `arc-runner.ts`
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 2.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-18T22:03:15.657Z

Updated: 2024-11-19T14:38:08.418Z

Reserved: 2024-11-14T15:05:46.766Z

Link: CVE-2024-52587

cve-icon Vulnrichment

Updated: 2024-11-19T14:37:46.084Z

cve-icon NVD

Status : Received

Published: 2024-11-18T22:15:09.557

Modified: 2024-11-19T15:35:15.427

Link: CVE-2024-52587

cve-icon Redhat

No data.