Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02MzRwLTkzaDktOTJ2aM4AAu2Z

ghas-to-csv vulnerable to Improper Neutralization of Formula Elements in a CSV File

Impact

This GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. The data flow looks like this 👇🏻

graph TD
    A(Repository) -->|developer dismissal, other data input| B(GitHub Advanced Security data)
    B -->|ghas-to-csv| C(CSV file)
    C -->|spreadsheet program| D(endpoint executes potentially malicious code)

Patches

Please use version v1 or later. That tag moves from using csv to defusedcsv to mitigate this problem.

Workarounds

There is no workaround. Please upgrade to using the latest tag, v1 (or later).

References

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-634p-93h9-92vh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02MzRwLTkzaDktOTJ2aM4AAu2Z
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: almost 2 years ago


CVSS Score: 5.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L

Identifiers: GHSA-634p-93h9-92vh, CVE-2022-39217
References: Repository: https://github.com/some-natalie/ghas-to-csv
Blast Radius: 1.0

Affected Packages

actions:some-natalie/ghas-to-csv
Affected Version Ranges: < 1
Fixed in: 1