NextCloud Cookbook's pull-checks.yml workflow is vulnerable to OS Command Injection
CVE-2023-31128
What is CVE-2023-31128?
The NextCloud Cookbook application is susceptible to command injection due to the use of an untrusted input field (github.head_ref). This vulnerability allows an attacker to leverage the pull-checks.yml workflow to execute arbitrary commands, potentially compromising the repository's integrity. Specifically, the injection can occur by manipulating the github.head_ref field, fostering unauthorized write access to the repository. This issue has been addressed in recent commits on both the master and main-0.9.x branches. Users managing forks of the NextCloud Cookbook are advised to update to the latest versions to fortify against such attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
cookbook master < a46d9855 < master a46d9855
cookbook main-0.9.x < 489bb744 < main-0.9.x 489bb744
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved