Fix: GitHub Actions Workflow Vulnerable to Code Injection Attack in .github/workflows/build.yml #663
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Context and Purpose:
This PR automatically remediates a security vulnerability:
${{...}}withgithubcontext data in arun:step could allow an attacker to inject their own code into the runner. This would allow them to steal secrets and code.githubcontext data can have arbitrary user input and should be treated as untrusted. Instead, use an intermediate environment variable withenv:to store the data and use the environment variable in therun:script. Be sure to use double-quotes the environment variable, like this: "$ENVVAR".This change is necessary to protect the application from potential security risks associated with this vulnerability.
Security Impact Assessment:
Evidence: Proof-of-Concept Exploitation Demo:
This demonstration shows how the vulnerability could be exploited to help you understand its severity and prioritize remediation.
How This Vulnerability Can Be Exploited:
The vulnerability in the .github/workflows/build.yml file allows shell injection because user-controlled GitHub context data (such as from pull request titles or bodies) is directly interpolated into
run:steps without sanitization. An attacker with the ability to create pull requests or issues in the repository (e.g., a contributor or via social engineering) can inject malicious shell commands that execute during the workflow run, potentially stealing secrets or modifying the build process. This is particularly exploitable in WSABuilds, where workflows automate Android image builds and may handle sensitive data like signing keys or API tokens for distribution.The vulnerability in the .github/workflows/build.yml file allows shell injection because user-controlled GitHub context data (such as from pull request titles or bodies) is directly interpolated into
run:steps without sanitization. An attacker with the ability to create pull requests or issues in the repository (e.g., a contributor or via social engineering) can inject malicious shell commands that execute during the workflow run, potentially stealing secrets or modifying the build process. This is particularly exploitable in WSABuilds, where workflows automate Android image builds and may handle sensitive data like signing keys or API tokens for distribution.Exploitation Impact Assessment:
Solution Implemented:
The automated remediation process has applied the necessary changes to the affected code in
.github/workflows/build.ymlto resolve the identified issue.Please review the changes to ensure they are correct and integrate as expected.