SYM_CONF_0023 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Property Value
Language yaml
Severity critical
CWE CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
OWASP A01:2017 - Injection
Confidence Level High
Impact Level High
Likelihood Level High

Description

Using GitHub context variables (like issue titles or pull request bodies) directly in run: steps allows untrusted user input to be executed as shell commands. This makes it possible for attackers to inject and run malicious code in your CI workflow.

Impact

If exploited, attackers could steal secrets, modify your codebase, or take control of your CI environment. This could lead to data breaches, code tampering, or unauthorized access to sensitive systems and credentials.