Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » GitHub’s ‘ArtiPACKED’ vulnerability exposes repositories to possible hijacking
Global Security

GitHub’s ‘ArtiPACKED’ vulnerability exposes repositories to possible hijacking

AdminBy AdminAugust 15, 2024No Comments3 Mins Read
GitHub Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 15, 2024Ravi LakshmananCloud Security / DevOps

GitHub Vulnerability

Duplicated newly discovered attack vector in GitHub Actions artifacts ArtiPACKED can be used to capture storage and gain access to organizations’ cloud environments.

“A combination of misconfigurations and security flaws can lead to token artifacts leaking from both third-party cloud services and GitHub tokens, making them available for use by anyone with read access to the repository,” Yaran Avital, Division 42 Researcher at Palo Alto Networks . said in a report released this week.

“This allows attackers with access to these artifacts to potentially compromise the services these secrets provide access to.”

Cyber ​​security

The cybersecurity firm said it primarily observed the leak of GitHub tokens (such as GITHUB_TOKEN and ACTIONS_RUNTIME_TOKEN), which could not only give attackers unauthorized access to repositories, but also allow them to poison source code and push it into production. through CI/CD workflows.

Artifacts on GitHub to allow users can share data between jobs in a workflow and retain that information for 90 days after it’s completed. This can include builds, log files, kernel dumps, test results, and deployment packages.

The security issue here is that these artifacts are publicly available in the case of open source projects, making them a valuable resource for mining secrets like GitHub access tokens.

Specifically, the artifacts were found to expose an undocumented environment variable called ACTIONS_RUNTIME_TOKEN, which has a lifetime of about six hours and can be used to replace the artifact with a malicious version before it expires.

This can then open a window of attack for remote code execution if developers directly download and execute a forged artifact or there is a subsequent workflow task configured to execute based on previously downloaded artifacts.

Although the GITHUB_TOKEN expires when the job ends, improvements made to the artifacts feature with version 4 meant that an attacker could use race condition scripts to steal and use the token by loading the artifact during workflow execution.

Cyber ​​security

The stolen token can be used later to push malicious code into the repository by creating a new branch before the pipeline job expires and the token is invalidated. However, this attack targets a worker process that has “content:write” permission.

A number of open source repositories associated with Amazon Web Services (AWS), Google, Microsoft, Red Hat and Ubuntu have been identified as vulnerable to the attack. GitHub, for its part, has classified the issue as informational, requiring users to take responsibility for securing their uploaded artifacts.

“The retirement of GitHub Artifacts V3 should prompt organizations that use the artifacts engine to rethink how they use it,” said Avital. “Overlooked elements, such as build artifacts, are often prime targets for attackers.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.