Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update gradle/gradle-build-action action to v3 [SECURITY] #79

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Sep 13, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
gradle/gradle-build-action action major v2 -> v3

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2023-30853

Impact

This vulnerability impacts GitHub workflows using the Gradle Build Action that have executed the Gradle Build Tool with the configuration cache enabled, potentially exposing secrets configured for the repository.

Secrets configured for GitHub Actions are normally passed to the Gradle Build Tool via environment variables. Due to the way that the Gradle Build Tool records these environment variables, they may be persisted into an entry in the GitHub Actions cache. This data stored in the GitHub Actions cache can be read by a GitHub Actions workflow running in an untrusted context, such as that running for a Pull Request submitted by a developer via a repository fork.

This vulnerability was discovered internally through code review, and we have not seen any evidence of it being exploited in the wild. However, in addition to upgrading the Gradle Build Action, you should delete any potentially vulnerable cache entries and may choose to rotate any potentially affected secrets (see Remediation).

Patches

Gradle Build Action v2.4.2 (and newer) no longer save this sensitive data for later use, preventing ongoing leakage of secrets via the GitHub Actions Cache. We strongly recommend that all users of the Gradle Build Action upgrade to v2.4.2 (or simply v2) immediately.

Remediation

While upgrading to the latest version of the Gradle Build Action will prevent leakage of secrets going forward, additional actions may be required due to current or previous GitHub Actions Cache entries containing this information.

Current cache entries will remain vulnerable until they are forcibly deleted or they expire naturally after 7 days of not being used. Potentially vulnerable entries can be easily identified in the GitHub UI by searching for a cache entry with key matching configuration-cache-*. We recommend that users of the Gradle Build Action inspect their list of cache entries and manually delete any that match this pattern.

While we have not seen any evidence of this vulnerability being exploited, we recommend cycling any repository secrets if you cannot be certain that these have not been compromised. Compromise could occur if you run a GitHub Actions workflow for a pull request attempting to exploit this data.
Warning signs to look for in a pull request include:

  • Making changes to GitHub Actions workflow files in a way that may attempt to read/extract data from the Gradle User Home or /.gradle directories.
  • Making changes to Gradle build files or other executable files that may be invoked by a GitHub Actions workflow, in a way that may attempt to read/extract information from these locations.

Workarounds

We strongly recommend that all users upgrade to the latest version of the Gradle Build Action as soon as possible, and delete any potentially vulnerable cache entries from the GitHub Actions cache (see Remediation).

If for some reason this is not possible, users can limit the impact of this vulnerability:

  • If the Gradle project does not opt-in to using the configuration cache, then it is not vulnerable.
  • If the Gradle project does opt-in to using the configuration-cache by default, then the --no-configuration-cache command-line argument can be used to disable this feature in a GitHub Actions workflow.

In any case, we recommend that users carefully inspect any pull request before approving the execution of GitHub Actions workflows. It may be prudent to require approval for all PRs from external contributors, as described here.


Release Notes

gradle/gradle-build-action (gradle/gradle-build-action)

v3

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title Pin gradle/gradle-build-action action to ef76a97 [SECURITY] Pin gradle/gradle-build-action action to b5126f3 [SECURITY] Sep 25, 2023
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from 52d559b to 98d6530 Compare September 25, 2023 15:11
@renovate renovate bot changed the title Pin gradle/gradle-build-action action to b5126f3 [SECURITY] Pin gradle/gradle-build-action action to 842c587 [SECURITY] Oct 1, 2023
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from 98d6530 to 332d3ee Compare October 1, 2023 00:45
@renovate renovate bot changed the title Pin gradle/gradle-build-action action to 842c587 [SECURITY] Update gradle/gradle-build-action digest to 842c587 [SECURITY] Nov 6, 2023
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from 332d3ee to c3432b9 Compare November 6, 2023 12:43
@renovate renovate bot changed the title Update gradle/gradle-build-action digest to 842c587 [SECURITY] Update gradle/gradle-build-action digest to 87a9a15 [SECURITY] Nov 27, 2023
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from c3432b9 to f634d53 Compare November 27, 2023 11:42
@renovate renovate bot changed the title Update gradle/gradle-build-action digest to 87a9a15 [SECURITY] Update gradle/gradle-build-action digest to 8cbcb99 [SECURITY] Dec 12, 2023
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from f634d53 to c6abf44 Compare December 12, 2023 18:25
@renovate renovate bot changed the title Update gradle/gradle-build-action digest to 8cbcb99 [SECURITY] Update gradle/gradle-build-action digest to 982da8e [SECURITY] Dec 20, 2023
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from c6abf44 to 7f668e4 Compare December 20, 2023 04:01
@renovate renovate bot changed the title Update gradle/gradle-build-action digest to 982da8e [SECURITY] Update gradle/gradle-build-action digest to a8f7551 [SECURITY] Jan 25, 2024
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from 7f668e4 to 9da410f Compare January 25, 2024 01:59
@renovate renovate bot changed the title Update gradle/gradle-build-action digest to a8f7551 [SECURITY] Update gradle/gradle-build-action action to v3 [SECURITY] Jun 17, 2024
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch 2 times, most recently from 9ec8a2e to e22e5a2 Compare June 17, 2024 22:33
@renovate renovate bot force-pushed the renovate/github-tags-gradle/gradle-build-action-vulnerability branch from e22e5a2 to a466dcd Compare July 15, 2024 20:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

0 participants