CVE-2024-3924

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-3924
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-3924.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-3924
Aliases
Published
2024-05-30T15:15:49Z
Modified
2025-01-15T05:15:01.598372Z
Summary
[none]
Details

A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the autodocs.yml workflow file. The vulnerability arises from the insecure handling of the github.head_ref user input, which is used to dynamically construct a command for installing a software package. An attacker can exploit this by forking the repository, creating a branch with a malicious payload as the name, and then opening a pull request to the base repository. Successful exploitation could lead to arbitrary code execution within the context of the GitHub Actions runner. This issue affects versions up to and including v2.0.0 and was fixed in version 2.0.0.

References

Affected packages

Git / github.com/huggingface/text-generation-inference

Affected ranges

Type
GIT
Repo
https://github.com/huggingface/text-generation-inference
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.2.0
v0.2.1
v0.3.0
v0.3.1
v0.3.2
v0.4.0
v0.4.1
v0.4.2
v0.4.3
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.8.1
v0.8.2
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.4

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.1.0
v1.1.1
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5

v2.*

v2.0.0