fix(helm/dependabot/renovate): Fix broken automatic update#13613
Merged
valentijnscholten merged 1 commit intoDefectDojo:bugfixfrom Nov 6, 2025
Merged
fix(helm/dependabot/renovate): Fix broken automatic update#13613valentijnscholten merged 1 commit intoDefectDojo:bugfixfrom
valentijnscholten merged 1 commit intoDefectDojo:bugfixfrom
Conversation
|
This pull request contains a workflow that checks out and runs code from the pull request head (github.event.pull_request.head.repo/full_name and ref), allowing untrusted forked PRs to execute arbitrary code in the CI environment and potentially exfiltrate GITHUB_TOKEN or other secrets. This is a high-risk workflow pattern and should be changed to avoid running untrusted code from forks, for example by restricting actions, using pull_request_target carefully, or requiring maintainer-reviewed workflows.
Arbitrary Code Execution in GitHub Actions from Forked Repository in
|
| Vulnerability | Arbitrary Code Execution in GitHub Actions from Forked Repository |
|---|---|
| Description | The GitHub Actions workflow uses actions/checkout to retrieve code from github.event.pull_request.head.repo.full_name and github.event.pull_request.head.ref. This means the workflow checks out and executes code directly from the head of a pull request, which can originate from an untrusted forked repository. An attacker can submit a pull request with malicious code, which will then be executed within the workflow's context, potentially leading to exfiltration of the GITHUB_TOKEN or other secrets, or injection of malicious artifacts. |
django-DefectDojo/.github/workflows/test-helm-chart.yml
Lines 110 to 112 in 218e263
All finding details can be found in the DryRun Security Dashboard.
Maffooch
approved these changes
Nov 4, 2025
valentijnscholten
approved these changes
Nov 4, 2025
…o#13520, DefectDojo#13530, DefectDojo#13612) Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
Jino-T
approved these changes
Nov 6, 2025
Maffooch
pushed a commit
to valentijnscholten/django-DefectDojo
that referenced
this pull request
Feb 16, 2026
…o#13520, DefectDojo#13530, DefectDojo#13612) (DefectDojo#13613) Signed-off-by: kiblik <5609770+kiblik@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Finish #13520
Fix #13530 & #13612
GHA is failing because action wasn't initialized correctly (https://github.com/DefectDojo/django-DefectDojo/actions/runs/19070470968/job/54486644356#step:4:21) - it needs to be checked out on the branch.