CVE-2025-61584 (CNNVD-202509-4521)
中文标题:
serverless-dns 命令注入漏洞
英文标题:
serverless-dns is vulnerable to Command Injection through pr.yml GitHub Action Workflow
漏洞描述
中文描述:
serverless-dns是serverless-dns开源的一个DNS解析器。 serverless-dns 0.1.30及之前版本存在命令注入漏洞,该漏洞源于pr.yml GitHub Action以不安全方式插入不受信任的输入,可能导致执行攻击者代码。
英文描述:
serverless-dns is a RethinkDNS resolver that deploys to Cloudflare Workers, Deno Deploy, Fastly, and Fly.io. Versions through abd including 0.1.30 have a vulnerability where the pr.yml GitHub Action interpolates in an unsafe manner untrusted input, specifically the github.event.pull_request.head.repo.clone_url and github.head_ref, to a command in the runner. Due to the action using the pull_request_target trigger it has permissive permissions by default. An unauthorized attacker can exploit this vulnerability to push arbitrary data to the repository. The subsequent impact on the end-user is executing the attackers' code when running serverless-dns. This is fixed in commit c5537dd, and expected to be released in 0.1.31.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| serverless-dns | serverless-dns | < 0.1.31 | - | - |
cpe:2.3:a:serverless-dns:serverless-dns:<_0.1.31:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
CRITICALCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-61584 |
2025-11-11 15:23:33 | 2025-11-11 07:40:48 |
| NVD | nvd_CVE-2025-61584 |
2025-11-11 15:01:04 | 2025-11-11 07:48:35 |
| CNNVD | cnnvd_CNNVD-202509-4521 |
2025-11-11 15:12:59 | 2025-11-11 08:00:14 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 命令注入
- cnnvd_id: 未提取 -> CNNVD-202509-4521
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']