
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2023-31128 affects NextCloud Cookbook, a recipe library app. The vulnerability was discovered in the pull-checks.yml workflow where an untrusted github.head_ref field could be exploited for command injection attacks. The issue was present in versions prior to commit a46d9855 on the master branch and commit 489bb744 on the main-0.9.x branch (GitHub Advisory).
The vulnerability exists in the GitHub Actions workflow file pull-checks.yml at line 67, where the github.head_ref value is used without proper validation. This is a Command Injection vulnerability (CWE-78) with a CVSS v3.1 Base Score of 8.8 (HIGH) according to NVD's assessment (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). GitHub's own assessment rates it slightly lower at 8.1 (HIGH) with the vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H (NVD).
The vulnerability only affects the main repository and its forks, with no direct risk to users of the NextCloud Cookbook app within the NextCloud server. However, if exploited, an attacker with write access to the repository could execute arbitrary commands through command injection (GitHub Advisory).
The vulnerability has been patched in commit a46d9855 on the master branch and commit 489bb744 on the main-0.9.x branch. Users who have forked the NextCloud Cookbook repository should update their forks to the latest version to prevent code injection attacks (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."