CVE-2024-42482

MEDIUM

fish-shop/syntax-check - Command Injection

Title source: llm
STIX 2.1

Description

fish-shop/syntax-check is a GitHub action for syntax checking fish shell files. Improper neutralization of delimiters in the `pattern` input (specifically the command separator `;` and command substitution characters `(` and `)`) mean that arbitrary command injection is possible by modification of the input value used in a workflow. This has the potential for exposure or exfiltration of sensitive information from the workflow runner, such as might be achieved by sending environment variables to an external entity. It is recommended that users update to the patched version `v1.6.12` or the latest release version `v2.0.0`, however remediation may be possible through careful control of workflows and the `pattern` input value used by this action.

Scores

CVSS v3 4.8
EPSS 0.0085
EPSS Percentile 75.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-140
Status published
Products (2)
fish-shop/syntax-check < 1.6.12
GitHub Actions/fish-shop/syntax-check 0 - 1.6.12GitHub Actions
Published Aug 12, 2024
Tracked Since Feb 18, 2026