Skip to content

fix(github-action)!: resolve command injection vulnerability in actio… #56

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

codejedi365
Copy link
Collaborator

…n script

Prevents the malicious execution of arbitrary code when a command injection is defined in the action yaml as part of the action parameter specification. Low impact exploitation if proper least privilege is implemented and pull request code is reviewed before merging to a release branch.

BREAKING CHANGE: The root_options action input parameter has been removed because it created a command injection vulernability for arbitrary code to execute within the container context of the GitHub action if a command injection code was provided as part of the root_options parameter string. To eliminate the vulnerability, each relevant option that can be provided to semantic-release has been individually added as its own parameter and will be processed individually to prevent command injection. Please review our Github Actions Configuration__ page on the Python Semantic Release Documentation website to review the newly available configuration options that replace the root_options parameter.

__ https://python-semantic-release.readthedocs.io/en/stable/automatic-releases/github-actions.html

Resolves: #55

Purpose

Rationale

How did you test?

How to Verify

@codejedi365 codejedi365 force-pushed the fix/github-action-cmd-injection-vulnerability branch 3 times, most recently from c9fb83c to 4bb4c61 Compare May 14, 2025 02:36
…n script

Prevents the malicious execution of arbitrary code when a command injection is
defined in the action yaml as part of the action parameter specification. Low
impact exploitation if proper least privilege is implemented and pull request
code is reviewed before merging to a release branch.

BREAKING CHANGE: The `root_options` action input parameter has been removed
because it created a command injection vulernability for arbitrary code to
execute within the container context of the GitHub action if a command injection
code was provided as part of the `root_options` parameter string. To eliminate
the vulnerability, each relevant option that can be provided to `semantic-release`
has been individually added as its own parameter and will be processed individually
to prevent command injection. Please review our `Github Actions Configuration`__
page on the Python Semantic Release Documentation website to review the newly available
configuration options that replace the `root_options` parameter.

__ https://python-semantic-release.readthedocs.io/en/stable/automatic-releases/github-actions.html

Resolves: python-semantic-release#55
@codejedi365 codejedi365 force-pushed the fix/github-action-cmd-injection-vulnerability branch from 4bb4c61 to a3ef23b Compare May 14, 2025 03:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Command injection through GH action inputs
1 participant