GitHub Actions allow to define environment variables by writing to a file pointed to by the GITHUB_ENV
environment variable:
This file contains lines in the KEY=VALUE
format:
steps:
- name: Set the value
id: step_one
run: |
echo "action_state=yellow" >> "$GITHUB_ENV"
It is also possible to define multiline variables by using the following construct:
KEY<<{delimiter}
VALUE
VALUE
{delimiter}
steps:
- name: Set the value in bash
id: step_one
run: |
{
echo 'JSON_RESPONSE<<EOF'
curl https://example.com
echo EOF
} >> "$GITHUB_ENV"
If an attacker can control the values assigned to environment variables and there is no sanitization in place, the attacker will be able to inject additional variables by injecting new lines or {delimiters}
.
-
Do not allow untrusted data to influence environment variables:
- Avoid using untrusted data sources (e.g., artifact content) to define environment variables.
- Validate and sanitize all inputs before using them in environment settings.
-
Do not allow new lines when defining single line environment variables:
echo "BODY=$(echo "$BODY" | tr -d '\n')" >> "$GITHUB_ENV"
-
Use unique identifiers when defining multi line environment variables:
steps: - name: Set the value in bash id: step_one run: | # Generate a UUID UUID=$(uuidgen) { echo "JSON_RESPONSE<<EOF$UUID" curl https://example.com echo "EOF$UUID" } >> "$GITHUB_ENV"
Consider the following basic setup where an environment variable MYVAR
is set and used in subsequent steps:
steps:
- name: Set the value
id: step_one
env:
BODY: ${{ github.event.comment.body }}
run: |
REPLACED=$(echo "$BODY" | sed 's/FOO/BAR/g')
echo "MYVAR=$REPLACED" >> "$GITHUB_ENV"
If an attacker can manipulate the value being set, such as through artifact downloads or user inputs, the attacker can potentially inject new environment variables. For example, they could write an issue comment like:
FOO
NEW_ENV_VAR=MALICIOUS_VALUE
Likewise, if the attacker controls a file in the GitHub Actions Runner's workspace (eg: the workflow checkouts untrusted code or downloads an untrusted artifact) and the contents of that file are assigned to an environment variable such as:
- run: |
PR_NUMBER=$(cat pr-number.txt)
echo "PR_NUMBER=$PR_NUMBER" >> $GITHUB_ENV
An attacker could craft a malicious artifact that writes dangerous environment variables:
- run: |
echo -e "666\nNEW_ENV_VAR=MALICIOUS_VALUE" > pr-number.txt
- uses: actions/upload-artifact@v4
with:
name: pr-number
path: ./pr-number.txt
An attacker is be able to run arbitrary code by injecting environment variables such as LD_PRELOAD
, BASH_ENV
, etc.