Skip to content

fix(security): validate core-ref input before checkout#45

Closed
DeepDiver1975 wants to merge 1 commit intomainfrom
fix/security-core-ref-validation
Closed

fix(security): validate core-ref input before checkout#45
DeepDiver1975 wants to merge 1 commit intomainfrom
fix/security-core-ref-validation

Conversation

@DeepDiver1975
Copy link
Copy Markdown
Member

Summary

  • inputs.core-ref and inputs.core-ref-php74 were passed directly to actions/checkout's ref: parameter with no validation
  • A caller can specify any git ref, including one pointing at a branch of owncloud/core containing a malicious Makefile that runs arbitrary code when make is called in subsequent steps
  • Fix: add a validation step before the checkout that rejects ref values containing characters outside [a-zA-Z0-9._/=-]

Security impact

MEDIUM — requires the attacker to also control a branch in owncloud/core, limiting exploitability, but the ref is fully caller-controlled.

Test plan

  • Verify valid refs (tags like v10.14.0, branch names like master, SHAs) still pass validation
  • Verify refs with shell metacharacters or path traversal are rejected with a clear error message

🤖 Generated with Claude Code

Add an explicit validation step that rejects core-ref and
core-ref-php74 values containing characters outside
[a-zA-Z0-9._/=-], preventing a caller from pointing the checkout
at an arbitrary or malicious ref that could execute hostile Makefile
targets.
@DeepDiver1975 DeepDiver1975 deleted the fix/security-core-ref-validation branch April 17, 2026 09:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant