Headline
GHSA-qq99-p57r-g3v7: code injection vulnerability exists in the huggingface/text-generation-inference repository
A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the autodocs.yml
workflow file. The vulnerability arises from the insecure handling of the github.head_ref
user input, which is used to dynamically construct a command for installing a software package. An attacker can exploit this by forking the repository, creating a branch with a malicious payload as the name, and then opening a pull request to the base repository. Successful exploitation could lead to arbitrary code execution within the context of the GitHub Actions runner. This issue affects versions up to and including v2.0.0 and was fixed in version 2.0.0.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-3924
code injection vulnerability exists in the huggingface/text-generation-inference repository
Moderate severity GitHub Reviewed Published Jun 2, 2024 to the GitHub Advisory Database • Updated Jun 2, 2024
Package
pip text-generation (pip)
Affected versions
< 2.0.0
A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the autodocs.yml workflow file. The vulnerability arises from the insecure handling of the github.head_ref user input, which is used to dynamically construct a command for installing a software package. An attacker can exploit this by forking the repository, creating a branch with a malicious payload as the name, and then opening a pull request to the base repository. Successful exploitation could lead to arbitrary code execution within the context of the GitHub Actions runner. This issue affects versions up to and including v2.0.0 and was fixed in version 2.0.0.
References
- https://nvd.nist.gov/vuln/detail/CVE-2024-3924
- huggingface/text-generation-inference@88702d8
- https://huntr.com/bounties/8af92fc2-0103-4d29-bb28-c3893154c422
Published to the GitHub Advisory Database
Jun 2, 2024