CVE-2023-30628

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30628
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30628.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30628
Aliases
  • GHSA-cw6r-6ccx-5hwx
Published
2023-04-24T22:15:09Z
Modified
2024-05-23T01:28:49.256360Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and kiwitcms/enterprise v12.2 and prior, the changelog.yml workflow is vulnerable to command injection attacks because of using an untrusted github.head_ref field. The github.head_ref value is an attacker-controlled value. Assigning the value to zzz";echo${IFS}"hello";# can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. Commit 834c86dfd1b2492ccad7ebbfd6304bfec895fed2 of the kiwitcms/Kiwi repository and commit e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751 of the kiwitcms/enterprise repository contain a fix for this issue.

References

Affected packages

Git / github.com/kiwitcms/enterprise

Affected ranges

Type
GIT
Repo
https://github.com/kiwitcms/enterprise
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/kiwitcms/kiwi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

tcms-api-1.*

tcms-api-1.4.0
tcms-api-1.5.0
tcms-api-1.5.1

tcms-api-4.*

tcms-api-4.0.0
tcms-api-4.2

tcms-api-5.*

tcms-api-5.0
tcms-api-5.1
tcms-api-5.2
tcms-api-5.3

v10.*

v10.0
v10.0-mt
v10.0.1-mt
v10.1
v10.1-mt
v10.2
v10.2-mt
v10.3
v10.3-mt
v10.4
v10.4-mt
v10.4.1-mt
v10.5
v10.5-mt
v10.5.1-mt

v11.*

v11.0
v11.0-mt
v11.1
v11.1-mt
v11.2
v11.2-mt
v11.3
v11.3-mt
v11.3.1-mt
v11.4
v11.4-mt
v11.5
v11.5-mt
v11.5.1-mt
v11.6
v11.6-mt
v11.7
v11.7-mt

v12.*

v12.0
v12.0-mt
v12.1
v12.1-mt
v12.2
v12.2-mt

v3.*

v3.21.1
v3.21.2
v3.22
v3.23
v3.26
v3.28
v3.30
v3.32
v3.33
v3.37
v3.38
v3.39
v3.41
v3.44
v3.48
v3.49
v3.50
v3.8.17-1
v3.8.18
v3.8.18.21

v4.*

v4.0.0
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.2

v5.*

v5.0
v5.1
v5.1-ee-807
v5.2
v5.2-ee-810
v5.2-ee-815
v5.2-ee-816.3
v5.3
v5.3-ee
v5.3.1
v5.3.1-ee

v6.*

v6.0
v6.0-ee
v6.0.1
v6.1
v6.1-ee
v6.1.1
v6.1.1-ee
v6.10
v6.10-mt
v6.11
v6.11-mt
v6.2
v6.2-ee
v6.2.1
v6.2.1-1124
v6.2.1-1127
v6.3
v6.4
v6.5
v6.5.1
v6.5.2
v6.5.3
v6.6
v6.7
v6.7.0.2-mt
v6.7.0.3-mt
v6.7.0.4-mt
v6.8
v6.8-mt
v6.8-mt-01
v6.8-mt-02
v6.9
v6.9-mt
v6.9.0.2-mt-01

v7.*

v7.0
v7.0-mt
v7.1
v7.1-mt
v7.2
v7.2-mt
v7.2.1
v7.3
v7.3-mt

v8.*

v8.0
v8.0-mt
v8.1
v8.1-mt
v8.2
v8.2-mt
v8.3
v8.3-mt
v8.4
v8.4-mt
v8.5
v8.5-mt
v8.5.1-mt
v8.5.2-mt
v8.6
v8.6-mt
v8.6.1
v8.7
v8.7-mt
v8.8
v8.8-mt
v8.9
v8.9-mt

v9.*

v9.0
v9.0-mt
v9.0.1