Woodpecker does not validate webhook before changing any data
High severity
GitHub Reviewed
Published
Aug 16, 2023
in
woodpecker-ci/woodpecker
•
Updated Nov 11, 2023
Package
Affected versions
>= 1.0.0, < 1.0.2
Patched versions
1.0.2
Description
Published to the GitHub Advisory Database
Aug 16, 2023
Reviewed
Aug 16, 2023
Published by the National Vulnerability Database
Aug 16, 2023
Last updated
Nov 11, 2023
Impact
An attacker can post malformed webhook data which leads to an update of the repository data that can e.g. allow the takeover of a repository.
This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage.
Patches
Please use either next or the latest v1.0 e.g. v1.0.2
Workarounds
Secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.
References
Fix: woodpecker-ci/woodpecker#2221
Backport: woodpecker-ci/woodpecker#2222
References