mirror of
https://github.com/netbootxyz/docker-netbootxyz.git
synced 2026-04-24 22:45:49 +03:00
[PR #121] Update aquasecurity/trivy-action action to v0.34.0 [SECURITY] #224
Labels
No labels
enhancement
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/docker-netbootxyz#224
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/netbootxyz/docker-netbootxyz/pull/121
Author: @renovate[bot]
Created: 2/27/2026
Status: 🔄 Open
Base:
master← Head:renovate/github-tags-aquasecurity-trivy-action-vulnerability📝 Commits (1)
b9c9d98Update aquasecurity/trivy-action action to v0.34.0 [SECURITY]📊 Changes
1 file changed (+1 additions, -1 deletions)
View changed files
📝
.github/workflows/build.yml(+1 -1)📄 Description
This PR contains the following updates:
0.33.1→0.34.0GitHub Vulnerability Alerts
CVE-2026-26189
Command Injection in aquasecurity/trivy-action via Unsanitized Environment Variable Export
A command injection vulnerability exists in
aquasecurity/trivy-actiondue to improper handling of action inputs when exporting environment variables. The action writesexport VAR=<input>lines totrivy_envs.txtbased on user-supplied inputs and subsequently sources this file inentrypoint.sh.Because input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g.,
$(...), backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context.Severity:
Moderate
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
Impact:
Successful exploitation may lead to arbitrary command execution in the CI runner environment.
Affected Versions:
7aca5acAffected Conditions:
The vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to
trivy_envs.txt. Access to user input is required by the malicious actor.A representative exploitation pattern involves incorporating untrusted pull request metadata into an action parameter. For example:
If the pull request title contains shell syntax, it may be executed when the generated environment file is sourced.
Not Affected:
trivy-actioninputssource ./trivy_envs.txtpatternCall Sites:
action.yaml:188—set_env_var_if_providedwrites unescapedexportlinesentrypoint.sh:9— sources./trivy_envs.txtRelease Notes
aquasecurity/trivy-action (aquasecurity/trivy-action)
v0.34.0Compare Source
What's Changed
Full Changelog: https://github.com/aquasecurity/trivy-action/compare/0.33.1...0.34.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.