CVE-2023-26493

CVSS V2 None CVSS V3 None
Description
Cocos Engine is an open-source framework for building 2D & 3D real-time rendering and interactive content. In the github repo for Cocos Engine the `web-interface-check.yml` was subject to command injection. The `web-interface-check.yml` was triggered when a pull request was opened or updated and contained the user controllable field `(${{ github.head_ref }} – the name of the fork’s branch)`. This would allow an attacker to take over the GitHub Runner and run custom commands (potentially stealing secrets such as GITHUB_TOKEN) and altering the repository. The workflow has since been removed for the repository. There are no actions required of users.
Overview
  • CVE ID
  • CVE-2023-26493
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-03-27T22:15:21
  • Last Modified Date
  • 2023-04-03T18:26:20
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:cocos:cocos-engine:*:*:*:*:*:*:*:* 1 OR 2023-02-20
History
Created Old Value New Value Data Type Notes
2023-04-17 03:38:42 Added to TrackCVE
2023-04-17 03:38:45 Weakness Enumeration new