Skip to content

[GHSA-34rf-485x-g5h7] Arbitrary Command Injection in Kubernetes Headlamp via macOS Process codeSign #5802

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: odaysec/advisory-improvement-5802
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
{
"schema_version": "1.4.0",
"id": "GHSA-34rf-485x-g5h7",
"modified": "2025-07-11T13:07:00Z",
"published": "2025-07-10T18:00:00Z",
"aliases": [
"CVE-2025-53542"
],
"summary": "Arbitrary Command Injection in Kubernetes Headlamp macOS Process headlamp@codeSign",
"details": "A command injection vulnerability was discovered in the `codeSign.js` script used in the macOS packaging workflow of the Kubernetes Headlamp project. This issue arises due to the improper use of Node.js’s `execSync()` function with unsanitized input derived from environment variables, which can be influenced by an attacker.\n\nThe vulnerable script `codeSign.js` accepts values from:\n\n- `teamID`\n- `entitlementsPath`\n- `config.app`\n\nThe variables `${teamID}`, `${entitlementsPath}`, and `${config.app}` are dynamically derived from the environment or application config and passed directly to the shell command without proper escaping or argument separation. This exposes the system to command injection if any of the values contain malicious input.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "codeSign.js"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.31.1"
}
]
}
],
"versions": [
"0.31.0"
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/kubernetes-sigs/headlamp/security/advisories/GHSA-34rf-485x-g5h7"
},
{
"type": "FIX",
"url": "https://github.com/kubernetes-sigs/headlamp/releases/tag/v0.31.1"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53542"
}
],
"database_specific": {
"cwe_ids": [
"CWE-78",
"CWE-88"
],
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2025-07-10T18:00:00Z",
"nvd_published_at": "2025-07-10T19:45:00Z"
}
}
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy