CVE-2024-21623

OTCLient is an alternative tibia client for otserv. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mehah:otclient:*:*:*:*:*:*:*:*

History

08 Jan 2024, 19:29

Type Values Removed Values Added
Summary (es) OTCLient es un cliente de tibia alternativo para otserv. Antes de confirmar db560de0b56476c87a2f967466407939196dd254, el workflow /mehah/otclient "`Analysis - SonarCloud`" es vulnerable a una inyección de expresión en Actions, lo que permite a un atacante ejecutar comandos de forma remota en el ejecutor, filtrar secretos y alterar el repositorio utilizando este workflow. La confirmación db560de0b56476c87a2f967466407939196dd254 contiene una solución para este problema. (es) OTCLient es un cliente de tibia alternativo para otserv. Antes del commit db560de0b56476c87a2f967466407939196dd254, el workflow /mehah/otclient "`Analysis - SonarCloud`" es vulnerable a una inyección de expresión en Actions, lo que permite a un atacante ejecutar comandos de forma remota en el ejecutor, filtrar secretos y alterar el repositorio utilizando este workflow. El commit db560de0b56476c87a2f967466407939196dd254 contiene una solución para este problema.
First Time Mehah
Mehah otclient
CPE cpe:2.3:a:mehah:otclient:*:*:*:*:*:*:*:*
References () https://github.com/mehah/otclient/blob/72744edc3b9913b920e0fd12e929604f682fda75/.github/workflows/analysis-sonarcloud.yml#L91-L104 - () https://github.com/mehah/otclient/blob/72744edc3b9913b920e0fd12e929604f682fda75/.github/workflows/analysis-sonarcloud.yml#L91-L104 - Product
References () https://github.com/mehah/otclient/commit/db560de0b56476c87a2f967466407939196dd254 - () https://github.com/mehah/otclient/commit/db560de0b56476c87a2f967466407939196dd254 - Patch
References () https://github.com/mehah/otclient/security/advisories/GHSA-q6gr-wc79-v589 - () https://github.com/mehah/otclient/security/advisories/GHSA-q6gr-wc79-v589 - Exploit, Vendor Advisory
References () https://securitylab.github.com/research/github-actions-preventing-pwn-requests/ - () https://securitylab.github.com/research/github-actions-preventing-pwn-requests/ - Exploit, Third Party Advisory
References () https://securitylab.github.com/research/github-actions-untrusted-input/ - () https://securitylab.github.com/research/github-actions-untrusted-input/ - Exploit, Third Party Advisory

03 Jan 2024, 13:48

Type Values Removed Values Added
Summary
  • (es) OTCLient es un cliente de tibia alternativo para otserv. Antes de confirmar db560de0b56476c87a2f967466407939196dd254, el workflow /mehah/otclient "`Analysis - SonarCloud`" es vulnerable a una inyección de expresión en Actions, lo que permite a un atacante ejecutar comandos de forma remota en el ejecutor, filtrar secretos y alterar el repositorio utilizando este workflow. La confirmación db560de0b56476c87a2f967466407939196dd254 contiene una solución para este problema.

02 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-02 21:15

Updated : 2024-01-08 19:29


NVD link : CVE-2024-21623

Mitre link : CVE-2024-21623

CVE.ORG link : CVE-2024-21623


JSON object : View

Products Affected

mehah

  • otclient
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')