Woodpecker's custom environment variables allow to alter execution flow of plugins
Moderate severity
GitHub Reviewed
Published
Jul 18, 2024
in
woodpecker-ci/woodpecker
•
Updated Nov 18, 2024
Description
Published to the GitHub Advisory Database
Jul 19, 2024
Reviewed
Jul 19, 2024
Published by the National Vulnerability Database
Jul 19, 2024
Last updated
Nov 18, 2024
Impact
The server allow to create any user who can trigger a pipeline run malicious workflows:
Patches
woodpecker-ci/woodpecker#3909
woodpecker-ci/woodpecker#3934
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Enable the "gated" repo feature and review each change upfront of running
References
Credits
References