CVE-2020-36762

A vulnerability was found in ONS Digital RAS Collection Instrument up to 2.0.27 and classified as critical. Affected by this issue is the function jobs of the file .github/workflows/comment.yml. The manipulation of the argument $COMMENT_BODY leads to os command injection. Upgrading to version 2.0.28 is able to address this issue. The name of the patch is dcaad2540f7d50c512ff2e031d3778dd9337db2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-234248.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ons:ras_collection_instrument:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-07-18 15:15

Updated : 2024-05-17 01:48


NVD link : CVE-2020-36762

Mitre link : CVE-2020-36762

CVE.ORG link : CVE-2020-36762


JSON object : View

Products Affected

ons

  • ras_collection_instrument
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')