Woodpecker's custom workspace allow to overwrite plugin entrypoint executable
High severity
GitHub Reviewed
Published
Jul 18, 2024
in
woodpecker-ci/woodpecker
•
Updated Aug 7, 2024
Description
Published to the GitHub Advisory Database
Jul 19, 2024
Reviewed
Jul 19, 2024
Published by the National Vulnerability Database
Jul 19, 2024
Last updated
Aug 7, 2024
Impact
The server allow to create any user who can trigger a pipeline run malicious workflows:
Patches
woodpecker-ci/woodpecker#3933
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Enable the "gated" repo feature and review each change upfront
References
Credits
References