-
-
Notifications
You must be signed in to change notification settings - Fork 155
Open
Labels
GSoCContributed in the context of the Google Summer of CodeContributed in the context of the Google Summer of Code
Description
The Problem:
Command-line build arguments flow directly into Docker containers and shell commands without any validation. An attacker can inject malicious commands through --build_args parameter.
Location:
tools\tests\systemtests\SystemtestArguments.py
tools\tests\docker-compose.template.yaml
Proof of Attack:
python systemtests.py --build_args="PRECICE_REF:v3.0;rm -rf /;whoami"
Real Damage:
- CI/CD Compromise: Steal GitHub secrets, AWS credentials, deployment keys
- Supply Chain Attack: Inject backdoors into Docker images distributed to users
- Data Theft: Exfiltrate source code, test data, intellectual property
- Infrastructure Takeover: Gain control of build servers, pivot to network
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
GSoCContributed in the context of the Google Summer of CodeContributed in the context of the Google Summer of Code