{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-26493","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-02-23T23:22:58.577Z","datePublished":"2023-03-27T21:35:36.844Z","dateUpdated":"2025-02-19T15:51:24.133Z"},"containers":{"cna":{"title":"Command Injection in Cocos Engine workflow","problemTypes":[{"descriptions":[{"cweId":"CWE-74","lang":"en","description":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/","tags":["x_refsource_CONFIRM"],"url":"https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/"},{"name":"https://github.com/cocos/cocos-engine/commit/6d06aefa2684e20da79e7ceaf41f728c1a8d7a41","tags":["x_refsource_MISC"],"url":"https://github.com/cocos/cocos-engine/commit/6d06aefa2684e20da79e7ceaf41f728c1a8d7a41"},{"name":"https://github.com/cocos/cocos-engine/blob/2362df28a4b3016dbda804899041279701929728/.github/workflows/web-interface-check.yml","tags":["x_refsource_MISC"],"url":"https://github.com/cocos/cocos-engine/blob/2362df28a4b3016dbda804899041279701929728/.github/workflows/web-interface-check.yml"}],"affected":[{"vendor":"cocos","product":"cocos-engine","versions":[{"version":"< 6d06aefa26","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-03-27T21:35:36.844Z"},"descriptions":[{"lang":"en","value":"Cocos Engine is an open-source framework for building 2D & 3D real-time rendering and interactive content. In the github repo for Cocos Engine the `web-interface-check.yml` was subject to command injection. The `web-interface-check.yml` was triggered when a pull request was opened or updated and contained the user controllable field `(${{ github.head_ref }} – the name of the fork’s branch)`. This would allow an attacker to take over the GitHub Runner and run custom commands (potentially stealing secrets such as GITHUB_TOKEN) and altering the repository. The workflow has since been removed for the repository. There are no actions required of users."}],"source":{"advisory":"GHSA-mxp5-rhmq-cw36","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:53:52.922Z"},"title":"CVE Program Container","references":[{"name":"https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/"},{"name":"https://github.com/cocos/cocos-engine/commit/6d06aefa2684e20da79e7ceaf41f728c1a8d7a41","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/cocos/cocos-engine/commit/6d06aefa2684e20da79e7ceaf41f728c1a8d7a41"},{"name":"https://github.com/cocos/cocos-engine/blob/2362df28a4b3016dbda804899041279701929728/.github/workflows/web-interface-check.yml","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/cocos/cocos-engine/blob/2362df28a4b3016dbda804899041279701929728/.github/workflows/web-interface-check.yml"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-19T15:51:20.010460Z","id":"CVE-2023-26493","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-19T15:51:24.133Z"}}]}}