
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-21423 affects projen, a project generation tool that synthesizes project configuration files. The issue was discovered in versions >= 0.6.0 and < 0.16.41, and was disclosed in April 2021. The vulnerability specifically impacts the rebuild-bot workflow functionality in NodeProject project types and its derivatives (GitHub Advisory).
The vulnerability exists in the rebuild-bot workflow (.github/workflows/rebuild-bot.yml) which is triggered by comments including '@projen rebuild' on pull requests. The workflow executes with a GITHUBTOKEN belonging to the target repository rather than the fork's repository. This differs from typical pullrequest event workflows, which execute with tokens from the source repository (GitHub Advisory).
In repositories without branch protection on their default branch, the vulnerability could allow unauthorized users to gain access to repository secrets (such as NPM tokens) and potentially make unauthorized modifications to the repository. The issue is particularly concerning for repositories that contain sensitive configuration or deployment credentials (GitHub Advisory).
The vulnerability was patched in version 0.16.41 by removing the issue_comment trigger from the workflow. Version 0.17.0 completely removed the rebuild-bot.yml workflow. For users unable to upgrade, an alternative mitigation is to remove the .github/workflows/rebuild-bot.yml file and add it to their .gitignore file via projenrc.js (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."