Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities

Posted on June 18, 2025June 18, 2025 By CWS

A complete safety investigation has revealed widespread vulnerabilities in GitHub Actions workflows throughout main open supply repositories, together with these maintained by prestigious organizations equivalent to MITRE and Splunk.

The invention highlights a regarding sample of insecure steady integration and steady supply (CI/CD) configurations that expose these tasks to potential provide chain assaults and unauthorized entry to delicate credentials.

The vulnerabilities middle across the misuse of GitHub Actions’ pull_request_target set off, which grants workflows entry to repository secrets and techniques and elevated permissions when processing pull requests from exterior contributors.

In contrast to the usual pull_request occasion that operates in a sandboxed surroundings, pull_request_target executes within the context of the goal repository’s base department, offering attackers with a pathway to compromise your complete venture infrastructure.

This basic design distinction has created a safety blind spot that malicious actors can exploit to realize unauthorized entry to API keys, deployment credentials, and administrative tokens.

The scope of this safety concern extends far past remoted incidents, representing a systemic drawback affecting quite a few high-profile open supply tasks.

Sysdig analysts recognized that these vulnerabilities stem from a basic misunderstanding of GitHub Actions safety fashions amongst repository maintainers, resulting in configurations that inadvertently expose essential infrastructure to exterior threats.

The analysis workforce found that regardless of years of public documentation about these dangers, many tasks proceed to implement harmful workflow patterns that present attackers with direct entry to manufacturing environments and delicate organizational knowledge.

The assault methodology includes submitting malicious pull requests that include crafted code designed to execute throughout the automated workflow course of.

memdump.py (Supply – Sysdig)

When repositories make the most of pull_request_target occasions whereas concurrently testing untrusted code from contributor forks, they create an execution surroundings the place malicious payloads can entry repository secrets and techniques and high-privilege GitHub tokens.

This mix proves significantly devastating as a result of it permits attackers to escalate privileges, modify repository contents, and probably propagate malicious code to downstream dependencies that depend on these compromised tasks.

The influence of those vulnerabilities extends past particular person repositories, threatening the broader open supply ecosystem’s integrity and trustworthiness.

Organizations that rely upon these tasks for essential infrastructure elements face potential publicity to produce chain assaults, the place compromised repositories may function entry factors for extra intensive organizational breaches.

Pull Request Goal Exploitation Mechanism

The technical basis of those assaults lies in GitHub Actions’ pull_request_target set off mechanism, which creates a harmful execution context when mixed with code checkout operations.

This set off was initially designed to allow workflows to course of pull requests with entry to repository secrets and techniques, however its implementation creates vital safety dangers when improperly configured.

The vulnerability manifests when workflows explicitly take a look at untrusted code utilizing parameters like github.occasion.pull_request.head.ref and github.occasion.pull_request.head.repo.full_name, successfully permitting exterior contributors to inject arbitrary code into privileged execution environments.

Within the case of the spotipy-dev/spotipy repository, researchers demonstrated this vulnerability by modifying the venture’s setup.py file to incorporate malicious set up instructions.

The exploit leveraged Python’s setuptools performance to execute arbitrary code throughout the package deal set up course of, as proven on this code snippet that extracts secrets and techniques from reminiscence and exfiltrates them to exterior servers.

The malicious setup configuration included customized set up instructions that downloaded and executed a reminiscence dumping script, successfully harvesting all accessible secrets and techniques and GitHub tokens from the workflow surroundings.

The exploitation course of proved remarkably easy throughout a number of repositories, with researchers efficiently compromising tasks from MITRE’s Cyber Analytics Repository and Splunk’s safety content material repository utilizing practically an identical strategies.

Every profitable assault resulted within the extraction of high-privilege GitHub tokens with complete write permissions, together with entry to repository contents, deployments, packages, and safety occasions.

This degree of entry permits attackers to utterly compromise goal repositories, modify supply code, manipulate releases, and probably inject malicious content material into software program distribution channels.

Energy up early risk detection, escalation, and mitigation with ANY.RUN’s Menace Intelligence Lookup. Get 50 trial searches.

Cyber Security News Tags:Actions, Critical, Exposes, GitHub, Insecure, MITRE, Open, Projects, Source, Splunk, Vulnerabilities

Post navigation

Previous Post: New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device
Next Post: Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT

Related Posts

Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Windows Task Scheduler Vulnerability Let Attackers Escalate Privileges Cyber Security News
Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Detect SQL Injection Vulnerabilities
  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award
  • Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
  • Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Detect SQL Injection Vulnerabilities
  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award
  • Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
  • Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News