Skip to content

Update dependency npm:renovate to v42.68.5 [SECURITY]#227

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-npm-renovate-vulnerability
Open

Update dependency npm:renovate to v42.68.5 [SECURITY]#227
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-npm-renovate-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Feb 3, 2026

This PR contains the following updates:

Package Change Age Confidence
npm:renovate (source) 42.66.842.68.5 age confidence

Renovate vulnerable to arbitrary command injection via Gradle Wrapper and malicious distributionUrl

GHSA-pfq2-hh62-7m96

More information

Details

Summary

Renovate can be tricked into executing shell code while updating the Gradle Wrapper. A malicious distributionUrl in gradle/wrapper/gradle-wrapper.properties can lead to command execution in the Renovate runtime.

Details

When Renovate handles Gradle Wrapper artifacts, it may run a wrapper update command such as:

  • ./gradlew :wrapper --gradle-distribution-url <value>

In the observed behavior, Renovate executes this via a shell (e.g., /bin/sh -c ...).
If distributionUrl contains shell command substitution syntax like $(...), the shell evaluates it before Gradle validates/parses the URL.

After that, Gradle attempts to parse the URL as a URI and fails with URISyntaxException, but the shell substitution has already executed.

This is reproducible even when allowScripts is disabled (default is OFF), because this execution happens as part of Gradle Wrapper artifact handling rather than “repository install scripts”.

Prerequisites / attack conditions:

  • The attacker must be able to get a malicious gradle-wrapper.properties into a repository that Renovate scans (e.g., direct write access, or a maintainer merges an attacker’s change/PR).
  • Renovate must be configured to process Gradle Wrapper updates/artifacts for that repository (default behavior for the Gradle Wrapper manager).
PoC
  1. Create a repository with a Gradle Wrapper (gradlew, gradlew.bat, gradle/wrapper/gradle-wrapper.jar, and gradle/wrapper/gradle-wrapper.properties).
  2. Set distributionUrl in gradle-wrapper.properties to include $(...).
  3. Run Renovate against the repository.
  4. Observe that a file is created during Renovate’s wrapper update step before Gradle fails with URISyntaxException.

A screen recording is attached showing end-to-end reproduction. In the demo, the payload creates /tmp/passwd_dump containing /etc/passwd, demonstrating that file read/exfiltration is possible within the Renovate execution context.

Impact

This allows arbitrary command execution in the Renovate runtime during Gradle Wrapper updates. Depending on deployment, this may expose credentials/tokens available to the bot and may allow an attacker to modify repositories or access internal resources reachable from the Renovate environment.

Remediation

Upgrading to Renovate 42.68.5 (2025-12-31) fixes this issue, and closes out other risks of shell evaluation for commands run by Renovate.

If using the composer, yarn (v1) or flux managers, please upgrade to 42.74.5 (2026-01-08), as there were follow-up fixes to keep these managers working.

Severity

  • CVSS Score: 6.7 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

renovatebot/renovate (npm:renovate)

v42.68.5

Compare Source

Bug Fixes
  • postUpgradeTasks: always run commands with shell mode (140a777)
  • util/exec: don't use shell by default (f430552)
Documentation
  • self-hosting: note risk of postUpgradeTasks with shell execution (d2872e2)
Code Refactoring
  • github-actions: Simplify line parsing (#​40216) (fb80abb)
  • util/exec: specify the args array for execa (a0a84a4)
  • util/exec: use spawnargs to return error messages (b19c3ee)
Tests
  • only validate subset of arguments to exec (bebff1c)
  • remove encoding from stubs (#​40221) (8fab5f0)
  • util/exec: clarify existing behaviour of shell parameter (d0bee7f)
  • util/exec: document ability to use arguments with spaces (c5c98ea)

v42.68.4

Compare Source

Bug Fixes
  • deps: update ghcr.io/renovatebot/base-image docker tag to v12.20.9 (main) (#​40224) (51d097e)

v42.68.3

Compare Source

Bug Fixes
  • deps: update ghcr.io/renovatebot/base-image docker tag to v12.20.8 (main) (#​40223) (847413f)
Miscellaneous Chores

v42.68.2

Compare Source

Bug Fixes
  • deps: update ghcr.io/containerbase/sidecar docker tag to v13.25.19 (main) (#​40219) (16a1325)
  • deps: update ghcr.io/renovatebot/base-image docker tag to v12.20.7 (main) (#​40220) (9d6553d)

v42.68.1

Compare Source

Bug Fixes
Miscellaneous Chores
  • deps: update dependency pnpm to v10.26.2 (main) (#​40217) (fdbeaba)
  • deps: update ghcr.io/containerbase/devcontainer docker tag to v13.25.19 (main) (#​40218) (3d8cca4)

v42.68.0

Compare Source

Features
Miscellaneous Chores
  • deps: update containerbase/internal-tools action to v3.14.42 (main) (#​40214) (73c14df)

v42.67.0

Compare Source

Features
Documentation
Miscellaneous Chores
Code Refactoring

v42.66.14

Compare Source

Bug Fixes
  • deps: update ghcr.io/renovatebot/base-image docker tag to v12.20.6 (main) (#​40207) (ac0e6ae)

v42.66.13

Compare Source

Bug Fixes
  • deps: update ghcr.io/renovatebot/base-image docker tag to v12.20.5 (main) (#​40206) (a7d4425)
Miscellaneous Chores
Code Refactoring

v42.66.12

Compare Source

Bug Fixes
Documentation
Miscellaneous Chores
Code Refactoring

v42.66.11

Compare Source

Bug Fixes
Miscellaneous Chores

v42.66.10

Compare Source

Bug Fixes

v42.66.9

Compare Source

Build System

Configuration

📅 Schedule: Branch creation - "" in timezone Europe/Dublin, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link

github-actions bot commented Feb 3, 2026

PR Preview Action b8175df66df2cbf627dbce69992b34cef012b20e

🚀 View preview at
https://Cursed-Solutions.github.io/discord-api-spec-repr/pr-preview/pr-227/

Built to branch docs at 2026-03-02 18:42 UTC.
Preview will be ready when the GitHub Pages deployment is complete.

@renovate renovate bot changed the title Update dependency npm:renovate to v42.68.5 [SECURITY] Update dependency npm:renovate to v42.68.5 [SECURITY] - autoclosed Mar 2, 2026
@renovate renovate bot closed this Mar 2, 2026
@renovate renovate bot deleted the renovate/npm-npm-renovate-vulnerability branch March 2, 2026 10:18
@renovate renovate bot changed the title Update dependency npm:renovate to v42.68.5 [SECURITY] - autoclosed Update dependency npm:renovate to v42.68.5 [SECURITY] Mar 2, 2026
@renovate renovate bot reopened this Mar 2, 2026
@renovate renovate bot force-pushed the renovate/npm-npm-renovate-vulnerability branch 2 times, most recently from d4e70c8 to e3e13c2 Compare March 2, 2026 18:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants