OTCLient is an alternative tibia client for otserv. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.
References
Link | Resource |
---|---|
https://github.com/mehah/otclient/blob/72744edc3b9913b920e0fd12e929604f682fda75/.github/workflows/analysis-sonarcloud.yml#L91-L104 | Product |
https://github.com/mehah/otclient/commit/db560de0b56476c87a2f967466407939196dd254 | Patch |
https://github.com/mehah/otclient/security/advisories/GHSA-q6gr-wc79-v589 | Exploit Vendor Advisory |
https://securitylab.github.com/research/github-actions-preventing-pwn-requests/ | Exploit Third Party Advisory |
https://securitylab.github.com/research/github-actions-untrusted-input/ | Exploit Third Party Advisory |
Configurations
History
08 Jan 2024, 19:29
Type | Values Removed | Values Added |
---|---|---|
Summary | (es) OTCLient es un cliente de tibia alternativo para otserv. Antes del commit db560de0b56476c87a2f967466407939196dd254, el workflow /mehah/otclient "`Analysis - SonarCloud`" es vulnerable a una inyección de expresión en Actions, lo que permite a un atacante ejecutar comandos de forma remota en el ejecutor, filtrar secretos y alterar el repositorio utilizando este workflow. El commit db560de0b56476c87a2f967466407939196dd254 contiene una solución para este problema. | |
First Time |
Mehah
Mehah otclient |
|
CPE | cpe:2.3:a:mehah:otclient:*:*:*:*:*:*:*:* | |
References | () https://github.com/mehah/otclient/blob/72744edc3b9913b920e0fd12e929604f682fda75/.github/workflows/analysis-sonarcloud.yml#L91-L104 - Product | |
References | () https://github.com/mehah/otclient/commit/db560de0b56476c87a2f967466407939196dd254 - Patch | |
References | () https://github.com/mehah/otclient/security/advisories/GHSA-q6gr-wc79-v589 - Exploit, Vendor Advisory | |
References | () https://securitylab.github.com/research/github-actions-preventing-pwn-requests/ - Exploit, Third Party Advisory | |
References | () https://securitylab.github.com/research/github-actions-untrusted-input/ - Exploit, Third Party Advisory |
03 Jan 2024, 13:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-02 21:15
Updated : 2024-01-08 19:29
NVD link : CVE-2024-21623
Mitre link : CVE-2024-21623
CVE.ORG link : CVE-2024-21623
JSON object : View
Products Affected
mehah
- otclient
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')