update
This commit is contained in:
151
terminal/cicdattacks2
Normal file
151
terminal/cicdattacks2
Normal file
@@ -0,0 +1,151 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome CI/CD Attacks [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12mOffensive research of systems and processes related to developing and deploying code.[39m
|
||||
|
||||
[38;2;255;187;0m[4mContents[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mTechniques[0m[38;5;12m (#techniques)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mPublicly Exposed Sensitive Data[0m[38;5;12m (#publicly-exposed-sensitive-data)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mInitial Code Execution[0m[38;5;12m (#initial-code-execution)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mPost Exploitation[0m[38;5;12m (#post-exploitation)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mDefense Evasion[0m[38;5;12m (#defense-evasion)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTools[0m[38;5;12m (#tools)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCase Studies[0m[38;5;12m (#case-studies)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSimilar Projects[0m[38;5;12m (#similar-projects)[39m
|
||||
|
||||
[38;2;255;187;0m[4mTechniques[0m
|
||||
[38;5;12mA curated list of unique and useful CI/CD attack techniques.[39m
|
||||
|
||||
[38;2;255;187;0m[4mPublicly Exposed Sensitive Data[0m
|
||||
[38;5;12m- [39m[38;5;14m[1m(The) Postman Carries Lots of Secrets[0m[38;5;12m (https://trufflesecurity.com/blog/postman-carries-lots-of-secrets) - Postman's public API network leaks thousands of secrets due to confusing UI, forks, and insufficient secret scanning.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAll the Small Things: Azure CLI Leakage and Problematic Usage Patterns[0m[38;5;12m (https://www.paloaltonetworks.com/blog/prisma-cloud/secrets-leakage-user-error-azure-cli/) - Azure CLI leaks secrets to CI/CD logs due to usage patterns.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAnyone can Access Deleted and Private Repository Data on GitHub[0m[38;5;12m (https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github) - As long as it's part of a fork network.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBeyond S3: Exposed Resources on AWS[0m[38;5;12m (https://duo.com/blog/beyond-s3-exposed-resources-on-aws) - Public EBS, RDS, AMI and ElasticSearch clusters exposed to the internet. [39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCloudQuarry:[0m[38;5;14m[1m [0m[38;5;14m[1mDigging[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1msecrets[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mpublic[0m[38;5;14m[1m [0m[38;5;14m[1mAMIs[0m[38;5;12m [39m[38;5;12m(https://securitycafe.ro/2024/05/08/aws-cloudquarry-digging-for-secrets-in-public-amis/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mResearchers[39m[38;5;12m [39m[38;5;12mfound[39m[38;5;12m [39m[38;5;12m500GB[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcredentials,[39m[38;5;12m [39m[38;5;12mprivate[39m[38;5;12m [39m[38;5;12mrepos,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mkeys[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mpublic[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mAMIs,[39m[38;5;12m [39m[38;5;12mimpacting[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m
|
||||
[38;5;12mindustries.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mEmployee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets[0m[38;5;12m (https://www.aquasec.com/blog/github-repos-expose-azure-and-red-hat-secrets/) - Employee's personal GitHub repos expose internal Azure & Red Hat secrets.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFortune[0m[38;5;14m[1m [0m[38;5;14m[1m500[0m[38;5;14m[1m [0m[38;5;14m[1mat[0m[38;5;14m[1m [0m[38;5;14m[1mRisk:[0m[38;5;14m[1m [0m[38;5;14m[1m250M[0m[38;5;14m[1m [0m[38;5;14m[1mArtifacts[0m[38;5;14m[1m [0m[38;5;14m[1mExposed[0m[38;5;14m[1m [0m[38;5;14m[1mvia[0m[38;5;14m[1m [0m[38;5;14m[1mMisconfigured[0m[38;5;14m[1m [0m[38;5;14m[1mRegistries[0m[38;5;12m [39m[38;5;12m(https://www.aquasec.com/blog/250m-artifacts-exposed-via-misconfigured-registries/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMisconfigured[39m[38;5;12m [39m[38;5;12mpublic[39m[38;5;12m [39m[38;5;12mregistries[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12martifacts[39m[38;5;12m [39m[38;5;12mcontaining[39m[38;5;12m [39m[38;5;12msensitive[39m[38;5;12m [39m
|
||||
[38;5;12mproprietary[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msecrets.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGitLab Secrets[0m[38;5;12m (https://github.com/RichardoC/gitlab-secrets) - A tool that can reveal deleted GitLab commits that potentially contain sensitive information and are not accessible via the public Git history.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHidden GitHub Commits and How to Reveal Them[0m[38;5;12m (https://neodyme.io/en/blog/github_secrets/) - A tool that can reveal deleted GitHub commits that potentially contain sensitive information and are not accessible via the public Git history.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHoles[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mYour[0m[38;5;14m[1m [0m[38;5;14m[1mBitbucket:[0m[38;5;14m[1m [0m[38;5;14m[1mWhy[0m[38;5;14m[1m [0m[38;5;14m[1mYour[0m[38;5;14m[1m [0m[38;5;14m[1mCI/CD[0m[38;5;14m[1m [0m[38;5;14m[1mPipeline[0m[38;5;14m[1m [0m[38;5;14m[1mIs[0m[38;5;14m[1m [0m[38;5;14m[1mLeaking[0m[38;5;14m[1m [0m[38;5;14m[1mSecrets[0m[38;5;12m [39m[38;5;12m(https://cloud.google.com/blog/topics/threat-intelligence/bitbucket-pipeline-leaking-secrets)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mBitbucket[39m[38;5;12m [39m[38;5;12mSecured[39m[38;5;12m [39m[38;5;12mVariables[39m[38;5;12m [39m[38;5;12mleak[39m[38;5;12m [39m[38;5;12msecrets[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12martifact[39m[38;5;12m [39m[38;5;12mobjects;[39m[38;5;12m [39m[38;5;12mrecommendations[39m[38;5;12m [39m
|
||||
[38;5;12minclude[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mdedicated[39m[38;5;12m [39m[38;5;12msecrets[39m[38;5;12m [39m[38;5;12mmanagers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mscanning.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mMillions[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSecrets[0m[38;5;14m[1m [0m[38;5;14m[1mExposed[0m[38;5;14m[1m [0m[38;5;14m[1mvia[0m[38;5;14m[1m [0m[38;5;14m[1mWeb[0m[38;5;14m[1m [0m[38;5;14m[1mApplication[0m[38;5;14m[1m [0m[38;5;14m[1mFrontends[0m[38;5;12m [39m[38;5;12m(https://web.archive.org/web/20230531032433/https://redhuntlabs.com/blog/millions-of-secrets-exposed-via-web-application-frontend/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMillions[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12msecrets[39m[38;5;12m [39m[38;5;12mexposed[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapp[39m[38;5;12m [39m[38;5;12mfrontends[39m[38;5;12m [39m[38;5;12mvia[39m
|
||||
[38;5;12mJavaScript[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdebug[39m[38;5;12m [39m[38;5;12mpages.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPublicly Exposed AWS Document DB Snapshots[0m[38;5;12m (https://ramimac.me/exposed-docdb) - Publicly exposed AWS DocumentDB snapshot of Cinemark Brazil revealed millions of customer records.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mThousands[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mimages[0m[38;5;14m[1m [0m[38;5;14m[1mon[0m[38;5;14m[1m [0m[38;5;14m[1mDocker[0m[38;5;14m[1m [0m[38;5;14m[1mHub[0m[38;5;14m[1m [0m[38;5;14m[1mleak[0m[38;5;14m[1m [0m[38;5;14m[1mauth[0m[38;5;14m[1m [0m[38;5;14m[1msecrets,[0m[38;5;14m[1m [0m[38;5;14m[1mprivate[0m[38;5;14m[1m [0m[38;5;14m[1mkeys[0m[38;5;12m [39m[38;5;12m(https://www.bleepingcomputer.com/news/security/thousands-of-images-on-docker-hub-leak-auth-secrets-private-keys/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mResearchers[39m[38;5;12m [39m[38;5;12mfound[39m[38;5;12m [39m[38;5;12mthousands[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDocker[39m[38;5;12m [39m[38;5;12mHub[39m[38;5;12m [39m[38;5;12mimages[39m[38;5;12m [39m[38;5;12mleaking[39m[38;5;12m [39m
|
||||
[38;5;12mprivate[39m[38;5;12m [39m[38;5;12mkeys[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mAPI[39m[38;5;12m [39m[38;5;12msecrets.[39m
|
||||
|
||||
[38;2;255;187;0m[4mInitial Code Execution[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mActionsTOCTOU (Time Of Check to Time Of Use)[0m[38;5;12m (https://github.com/AdnaneKhan/ActionsTOCTOU/) - A tool to monitor for an approval event and then quickly replace a file in the PR head with a local file specified as a parameter.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAWS Targeted by a Package Backfill Attack[0m[38;5;12m (https://www.mend.io/blog/aws-targeted-by-a-package-backfill-attack/) - Scan commit history for internal packages to execute dependency confusion.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCan you trust ChatGPT's package recommendations?[0m[38;5;12m (https://vulcan.io/blog/ai-hallucinations-package-risk) - Exploit generative AI platforms' tendency to generate non-existent coding libraries to execute Dependecy Confusion.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCan You Trust Your VSCode Extensions?[0m[38;5;12m (https://www.aquasec.com/blog/can-you-trust-your-vscode-extensions/) - Impersonate popular VSCode extensions and trick unknowing developers into downloading them.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDeep[0m[38;5;14m[1m [0m[38;5;14m[1mdive[0m[38;5;14m[1m [0m[38;5;14m[1minto[0m[38;5;14m[1m [0m[38;5;14m[1mVisual[0m[38;5;14m[1m [0m[38;5;14m[1mStudio[0m[38;5;14m[1m [0m[38;5;14m[1mCode[0m[38;5;14m[1m [0m[38;5;14m[1mextension[0m[38;5;14m[1m [0m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m[38;5;14m[1mvulnerabilities[0m[38;5;12m [39m[38;5;12m(https://snyk.io/blog/visual-studio-code-extension-security-vulnerabilities-deep-dive/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mVS[39m[38;5;12m [39m[38;5;12mCode[39m[38;5;12m [39m[38;5;12mextensions[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m[38;5;12m [39m[38;5;12m(command[39m[38;5;12m [39m[38;5;12minjection,[39m[38;5;12m [39m[38;5;12mpath[39m[38;5;12m [39m[38;5;12mtraversal,[39m[38;5;12m [39m[38;5;12mzip[39m[38;5;12m [39m[38;5;12mslip)[39m
|
||||
[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mcompromise[39m[38;5;12m [39m[38;5;12mdeveloper[39m[38;5;12m [39m[38;5;12mmachines.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDependency[0m[38;5;14m[1m [0m[38;5;14m[1mConfusion:[0m[38;5;14m[1m [0m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mI[0m[38;5;14m[1m [0m[38;5;14m[1mHacked[0m[38;5;14m[1m [0m[38;5;14m[1mInto[0m[38;5;14m[1m [0m[38;5;14m[1mApple,[0m[38;5;14m[1m [0m[38;5;14m[1mMicrosoft[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mDozens[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mOther[0m[38;5;14m[1m [0m[38;5;14m[1mCompanies[0m[38;5;12m [39m[38;5;12m(https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mResearchers[39m[38;5;12m [39m[38;5;12muploaded[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mpackages[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12minternal[39m[38;5;12m [39m[38;5;12mcompany[39m[38;5;12m [39m[38;5;12mnames,[39m[38;5;12m [39m[38;5;12mgaining[39m[38;5;12m [39m[38;5;12maccess[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12mApple,[39m[38;5;12m [39m[38;5;12mMicrosoft,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mothers[39m[38;5;12m [39m[38;5;12mdue[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdependency[39m[38;5;12m [39m[38;5;12mconfusion.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDependency Confusions in Docker and remote pwning of your infra[0m[38;5;12m (https://www.errno.fr/DockerDependencyConfusion.html) - Docker dependency confusion occurs when a misconfigured Docker mirror pulls malicious public images instead of private ones.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mErosion[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mTrust:[0m[38;5;14m[1m [0m[38;5;14m[1mUnmasking[0m[38;5;14m[1m [0m[38;5;14m[1mSupply[0m[38;5;14m[1m [0m[38;5;14m[1mChain[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mTerraform[0m[38;5;14m[1m [0m[38;5;14m[1mRegistry[0m[38;5;12m [39m[38;5;12m(https://boostsecurity.io/blog/erosion-of-trust-unmasking-supply-chain-vulnerabilities-in-the-terraform-registry)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mTerraform[39m[38;5;12m [39m[38;5;12mmodules[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mprotected[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||||
[38;5;12mDependency[39m[38;5;12m [39m[38;5;12mLock[39m[38;5;12m [39m[38;5;12mFile,[39m[38;5;12m [39m[38;5;12mconsequently,[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mseemingly[39m[38;5;12m [39m[38;5;12mharmless[39m[38;5;12m [39m[38;5;12mmodule[39m[38;5;12m [39m[38;5;12mcould[39m[38;5;12m [39m[38;5;12mpotentially[39m[38;5;12m [39m[38;5;12mintroduce[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mcode.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFixing typos and breaching microsoft's perimeter[0m[38;5;12m (https://johnstawinski.com/2024/04/15/fixing-typos-and-breaching-microsofts-perimeter/) - Bypass GitHub workflow approval requirement by becoming a contributor.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mDataset[0m[38;5;14m[1m [0m[38;5;14m[1mResearch[0m[38;5;14m[1m [0m[38;5;14m[1mReveals[0m[38;5;14m[1m [0m[38;5;14m[1mMillions[0m[38;5;14m[1m [0m[38;5;14m[1mPotentially[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerable[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mRepoJacking[0m[38;5;12m [39m[38;5;12m(https://www.aquasec.com/blog/github-dataset-research-reveals-millions-potentially-vulnerable-to-repojacking/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMillions[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mrepos[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12mRepoJacking[39m[38;5;12m [39m[38;5;12mdue[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12morg[39m[38;5;12m [39m[38;5;12mrenames,[39m[38;5;12m [39m[38;5;12mleading[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mexecution.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGitloker[0m[38;5;14m[1m [0m[38;5;14m[1mattacks[0m[38;5;14m[1m [0m[38;5;14m[1mabuse[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mnotifications[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mpush[0m[38;5;14m[1m [0m[38;5;14m[1mmalicious[0m[38;5;14m[1m [0m[38;5;14m[1mOAuth[0m[38;5;14m[1m [0m[38;5;14m[1mapps[0m[38;5;12m [39m[38;5;12m(https://www.bleepingcomputer.com/news/security/gitloker-attacks-abuse-github-notifications-to-push-malicious-oauth-apps/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAttackers[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mfake[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mnotifications[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12mtrick[39m[38;5;12m [39m[38;5;12musers[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mauthorizing[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mOAuth[39m[38;5;12m [39m[38;5;12mapps[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12msteal[39m[38;5;12m [39m[38;5;12mrepo[39m[38;5;12m [39m[38;5;12maccess.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHacking GitHub AWS integrations again[0m[38;5;12m (https://dagrz.com/writing/aws-security/hacking-github-aws-oidc/) - Attacking misconfigured pipelines that use OIDC.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow I hacked into Google's internal corporate assets[0m[38;5;12m (https://observationsinsecurity.com/2024/04/25/how-i-hacked-into-googles-internal-corporate-assets/) - More ways to find dependencies in code for Dependency Confusion.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow to completely own an airline in 3 easy steps[0m[38;5;12m (https://maia.crimew.gay/posts/how-to-hack-an-airline/) - Misconfigured CI system accessible from the internet.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mWe[0m[38;5;14m[1m [0m[38;5;14m[1mHacked[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mSoftware[0m[38;5;14m[1m [0m[38;5;14m[1mSupply[0m[38;5;14m[1m [0m[38;5;14m[1mChain[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1m$50K[0m[38;5;12m [39m[38;5;12m(https://www.landh.tech/blog/20250211-hack-supply-chain-for-50k/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mScraped[39m[38;5;12m [39m[38;5;12mJavaScript[39m[38;5;12m [39m[38;5;12mfront-end[39m[38;5;12m [39m[38;5;12mfiles[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mASTs[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12mimport/require[39m[38;5;12m [39m[38;5;12mstatements[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mlead[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdiscovering[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||||
[38;5;12mpublic[39m[38;5;12m [39m[38;5;12mcontainer[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mNPM[39m[38;5;12m [39m[38;5;12mcredentials.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mIntroducing[0m[38;5;14m[1m [0m[38;5;14m[1mMavenGate:[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1msupply[0m[38;5;14m[1m [0m[38;5;14m[1mchain[0m[38;5;14m[1m [0m[38;5;14m[1mattack[0m[38;5;14m[1m [0m[38;5;14m[1mmethod[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mJava[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mAndroid[0m[38;5;14m[1m [0m[38;5;14m[1mapplications[0m[38;5;12m [39m[38;5;12m(https://blog.oversecured.com/Introducing-MavenGate-a-supply-chain-attack-method-for-Java-and-Android-applications/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMany[39m[38;5;12m [39m[38;5;12mpublic[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mpopular[39m[38;5;12m [39m[38;5;12mlibraries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m
|
||||
[38;5;12mhave[39m[38;5;12m [39m[38;5;12mlong[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mabandoned[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mstill[39m[38;5;12m [39m[38;5;12mbeing[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mhuge[39m[38;5;12m [39m[38;5;12mprojects.[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprojects[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mhijacked[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12mdomain[39m[38;5;12m [39m[38;5;12mname[39m[38;5;12m [39m[38;5;12mpurchases.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mKeeping[0m[38;5;14m[1m [0m[38;5;14m[1myour[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mActions[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mworkflows[0m[38;5;14m[1m [0m[38;5;14m[1msecure[0m[38;5;14m[1m [0m[38;5;14m[1mPart[0m[38;5;14m[1m [0m[38;5;14m[1m1:[0m[38;5;14m[1m [0m[38;5;14m[1mPreventing[0m[38;5;14m[1m [0m[38;5;14m[1mpwn[0m[38;5;14m[1m [0m[38;5;14m[1mrequests[0m[38;5;12m [39m[38;5;12m(https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mCombining[39m[38;5;12m [39m[38;5;12mpull_request_target[39m[38;5;12m [39m[38;5;12mworkflow[39m[38;5;12m [39m[38;5;12mtrigger[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mexplicit[39m[38;5;12m [39m[38;5;12mcheckout[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m
|
||||
[38;5;12muntrusted[39m[38;5;12m [39m[38;5;12mPR[39m[38;5;12m [39m[38;5;12mmay[39m[38;5;12m [39m[38;5;12mlead[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrepository[39m[38;5;12m [39m[38;5;12mcompromise.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mKeeping your GitHub Actions and workflows secure Part 2: Untrusted input[0m[38;5;12m (https://securitylab.github.com/research/github-actions-untrusted-input/) - GitHub Actions command injection.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mMalicious[0m[38;5;14m[1m [0m[38;5;14m[1mcode[0m[38;5;14m[1m [0m[38;5;14m[1manalysis:[0m[38;5;14m[1m [0m[38;5;14m[1mAbusing[0m[38;5;14m[1m [0m[38;5;14m[1mSAST[0m[38;5;14m[1m [0m[38;5;14m[1m(mis)configurations[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mhack[0m[38;5;14m[1m [0m[38;5;14m[1mCI[0m[38;5;14m[1m [0m[38;5;14m[1msystems[0m[38;5;12m [39m[38;5;12m(https://medium.com/cider-sec/malicious-code-analysis-abusing-sast-mis-configurations-to-hack-ci-systems-13d5c1b37ffe)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMisconfigured[39m[38;5;12m [39m[38;5;12mSAST[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mexploited[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12mexecute[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mCI[39m[38;5;12m [39m[38;5;12msystems,[39m[38;5;12m [39m[38;5;12mallowing[39m[38;5;12m [39m[38;5;12mattackers[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msteal[39m[38;5;12m [39m[38;5;12mcredentials[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mdeploy[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12martifacts.[39m[38;5;12m [39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPPE — Poisoned Pipeline Execution[0m[38;5;12m (https://medium.com/cider-sec/ppe-poisoned-pipeline-execution-34f4e8d0d4e9) - Poisoned Pipeline Execution (PPE) lets attackers run malicious code in a CI/CD system without direct access.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1malert:[0m[38;5;14m[1m [0m[38;5;14m[1msocial[0m[38;5;14m[1m [0m[38;5;14m[1mengineering[0m[38;5;14m[1m [0m[38;5;14m[1mcampaign[0m[38;5;14m[1m [0m[38;5;14m[1mtargets[0m[38;5;14m[1m [0m[38;5;14m[1mtechnology[0m[38;5;14m[1m [0m[38;5;14m[1mindustry[0m[38;5;14m[1m [0m[38;5;14m[1memployees[0m[38;5;12m [39m[38;5;12m(https://github.blog/2023-07-18-security-alert-social-engineering-campaign-targets-technology-industry-employees/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPhishing[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12musers[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdownload[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexecute[39m
|
||||
[38;5;12mrepositories.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mMonsters[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mYour[0m[38;5;14m[1m [0m[38;5;14m[1mBuild[0m[38;5;14m[1m [0m[38;5;14m[1mCache[0m[38;5;14m[1m [0m[38;5;14m[1m–[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mActions[0m[38;5;14m[1m [0m[38;5;14m[1mCache[0m[38;5;14m[1m [0m[38;5;14m[1mPoisoning[0m[38;5;12m [39m[38;5;12m(https://adnanthekhan.com/2024/05/06/the-monsters-in-your-build-cache-github-actions-cache-poisoning/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAllows[39m[38;5;12m [39m[38;5;12mattackers[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcompromise[39m[38;5;12m [39m[38;5;12mworkflows[39m[38;5;12m [39m[38;5;12meven[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mlimited[39m[38;5;12m [39m[38;5;12mpermissions[39m[38;5;12m [39m[38;5;12mby[39m
|
||||
[38;5;12mexploiting[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mdependency[39m[38;5;12m [39m[38;5;12mflaws,[39m[38;5;12m [39m[38;5;12mattackers[39m[38;5;12m [39m[38;5;12msteal[39m[38;5;12m [39m[38;5;12mcache[39m[38;5;12m [39m[38;5;12mtokens,[39m[38;5;12m [39m[38;5;12mfill[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcache[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mforce[39m[38;5;12m [39m[38;5;12mevictions,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mreplace[39m[38;5;12m [39m[38;5;12mlegitimate[39m[38;5;12m [39m[38;5;12mentries[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mcode.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThousands of npm accounts use email addresses with expired domains[0m[38;5;12m (https://therecord.media/thousands-of-npm-accounts-use-email-addresses-with-expired-domains) - Maintainer Email hijacking.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mUnderstanding[0m[38;5;14m[1m [0m[38;5;14m[1mtyposquatting[0m[38;5;14m[1m [0m[38;5;14m[1mmethods[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1msecure[0m[38;5;14m[1m [0m[38;5;14m[1msupply[0m[38;5;14m[1m [0m[38;5;14m[1mchain[0m[38;5;12m [39m[38;5;12m(https://bytesafe.dev/posts/understanding-typosquatting-methods/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mTyposquatting[39m[38;5;12m [39m[38;5;12minvolves[39m[38;5;12m [39m[38;5;12mpublishing[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mpackages[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mnames[39m[38;5;12m [39m[38;5;12msimilar[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mlegitimate[39m[38;5;12m [39m[38;5;12mones,[39m[38;5;12m [39m[38;5;12mexploiting[39m[38;5;12m [39m[38;5;12mtypos[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12minject[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mcode.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mVulnerable GitHub Actions Workflows Part 1: Privilege Escalation Inside Your CI/CD Pipeline[0m[38;5;12m (https://www.legitsecurity.com/blog/github-privilege-escalation-vulnerability) - GitHub Actions workflow_run PE.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWhat[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mfork?[0m[38;5;14m[1m [0m[38;5;14m[1mImposter[0m[38;5;14m[1m [0m[38;5;14m[1mcommits[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mActions[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mCI/CD[0m[38;5;12m [39m[38;5;12m(https://www.chainguard.dev/unchained/what-the-fork-imposter-commits-in-github-actions-and-ci-cd)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mActions[39m[38;5;12m [39m[38;5;12mvulnerability[39m[38;5;12m [39m[38;5;12mallows[39m[38;5;12m [39m[38;5;12mforked[39m[38;5;12m [39m[38;5;12mcommits[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbypass[39m[38;5;12m [39m[38;5;12mworkflow[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||||
[38;5;12msettings.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mwhoAMI: A cloud image name confusion attack[0m[38;5;12m (https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/) - Dependency Confusion using AWS AMIs.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWordPress Plugin Confusion: How an update can get you pwned[0m[38;5;12m (https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-update-can-get-you-pwned/) - Unclaimed WordPress plugins are vulnerable to takeover via the plugin directory.[39m
|
||||
|
||||
[38;2;255;187;0m[4mPost Exploitation[0m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFrom[0m[38;5;14m[1m [0m[38;5;14m[1mSelf-Hosted[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mRunner[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mSelf-Hosted[0m[38;5;14m[1m [0m[38;5;14m[1mBackdoor[0m[38;5;12m [39m[38;5;12m(https://www.praetorian.com/blog/self-hosted-github-runners-are-backdoors/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAttackers[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mmisconfigured[39m[38;5;12m [39m[38;5;12mrunners[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mweak[39m[38;5;12m [39m[38;5;12mPAT[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mgain[39m[38;5;12m [39m[38;5;12mpersistence,[39m[38;5;12m [39m[38;5;12mescalate[39m[38;5;12m [39m[38;5;12mprivileges,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mmove[39m[38;5;12m [39m[38;5;12mlaterally.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHacking Terraform State for Privilege Escalation[0m[38;5;12m (https://blog.plerion.com/hacking-terraform-state-privilege-escalation/) - Modifying a Terraform state file allows attackers to delete infrastructure or execute code via custom providers.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHijacking[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mrunners[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mcompromise[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1morganization[0m[38;5;12m [39m[38;5;12m(https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mRegistering[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mrunner[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mubuntu-latest[39m[38;5;12m [39m[38;5;12mtag[39m[38;5;12m [39m[38;5;12mgrants[39m[38;5;12m [39m[38;5;12maccess[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mjobs[39m[38;5;12m [39m[38;5;12moriginally[39m[38;5;12m [39m
|
||||
[38;5;12mdesignated[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mGitHub-provisioned[39m[38;5;12m [39m[38;5;12mrunners.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow We Discovered Vulnerabilities in CI/CD Pipelines of Popular Open-Source Projects[0m[38;5;12m (https://cycode.com/blog/github-actions-vulnerabilities) - Extracting all repository and organization secrets in GitHub Actions.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mInvisible Ghost: Alarming Vulnerability in GitHub Copilot[0m[38;5;12m (https://www.apexhq.ai/blog/blog/invisible-ghost-alarming-vulnerability-in-github-copilot/) - Using hidden Unicode characters to manipulate GitHub Copilot's suggestions.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mLeaking[0m[38;5;14m[1m [0m[38;5;14m[1mSecrets[0m[38;5;14m[1m [0m[38;5;14m[1mFrom[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mActions:[0m[38;5;14m[1m [0m[38;5;14m[1mReading[0m[38;5;14m[1m [0m[38;5;14m[1mFiles[0m[38;5;14m[1m [0m[38;5;14m[1mAnd[0m[38;5;14m[1m [0m[38;5;14m[1mEnvironment[0m[38;5;14m[1m [0m[38;5;14m[1mVariables,[0m[38;5;14m[1m [0m[38;5;14m[1mIntercepting[0m[38;5;14m[1m [0m[38;5;14m[1mNetwork/Process[0m[38;5;14m[1m [0m[38;5;14m[1mCommunication,[0m[38;5;14m[1m [0m[38;5;14m[1mDumping[0m[38;5;14m[1m [0m[38;5;14m[1mMemory[0m[38;5;12m [39m[38;5;12m(https://karimrahal.com/2023/01/05/github-actions-leaking-secrets/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLeaking[39m[38;5;12m [39m[38;5;12msecrets[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m
|
||||
[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mActions[39m[38;5;12m [39m[38;5;12mworkflows[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mpossible[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12mmethods:[39m[38;5;12m [39m[38;5;12mreading[39m[38;5;12m [39m[38;5;12mfiles/environment[39m[38;5;12m [39m[38;5;12mvariables,[39m[38;5;12m [39m[38;5;12mintercepting[39m[38;5;12m [39m[38;5;12mcommunication,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdumping[39m[38;5;12m [39m[38;5;12mrunner[39m[38;5;12m [39m[38;5;12mmemory.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLiving off the pipeline[0m[38;5;12m (https://github.com/boostsecurityio/lotp) - Inventory how development tools (typically CLIs), have lesser-known RCE-By-Design features.[39m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mRegistering self-hosted CircleCI runner[0m[38;5;12m (broken_links.md/#httpstwittercomalxk7istatus1524353383976558593t5esgwtom2218sgygy5vdoas19) - Can be used to steal secrets of job executed on the malicious runner. [39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mActions[0m[38;5;14m[1m [0m[38;5;14m[1mWorm:[0m[38;5;14m[1m [0m[38;5;14m[1mCompromising[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mRepositories[0m[38;5;14m[1m [0m[38;5;14m[1mThrough[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mActions[0m[38;5;14m[1m [0m[38;5;14m[1mDependency[0m[38;5;14m[1m [0m[38;5;14m[1mTree[0m[38;5;12m [39m[38;5;12m(https://www.paloaltonetworks.com/blog/prisma-cloud/github-actions-worm-dependencies/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mnovel[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mActions[39m[38;5;12m [39m[38;5;12mworm[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12maction[39m[38;5;12m [39m[38;5;12mdependency[39m[38;5;12m [39m
|
||||
[38;5;12mtree.[39m[38;5;12m [39m[38;5;12mAttackers[39m[38;5;12m [39m[38;5;12mcompromise[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12maction,[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12minfect[39m[38;5;12m [39m[38;5;12mdependent[39m[38;5;12m [39m[38;5;12mactions[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12mbranch[39m[38;5;12m [39m[38;5;12mpushes[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mtag[39m[38;5;12m [39m[38;5;12moverwrites,[39m[38;5;12m [39m[38;5;12mspreading[39m[38;5;12m [39m[38;5;12mmalware[39m[38;5;12m [39m[38;5;12mrecursively.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mDefense Evasion[0m
|
||||
[38;5;12m- [39m[38;5;14m[1m#redteam tip: want to discretely extract credentials from a CI/CD pipeline?[0m[38;5;12m (https://twitter.com/_alxk/status/1442519103885959172?s=21) - Draft pull requests won't alert repository contributors, but will still trigger pipelines.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mAbusing[0m[38;5;14m[1m [0m[38;5;14m[1mRepository[0m[38;5;14m[1m [0m[38;5;14m[1mWebhooks[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mAccess[0m[38;5;14m[1m [0m[38;5;14m[1mInternal[0m[38;5;14m[1m [0m[38;5;14m[1mCI/CD[0m[38;5;14m[1m [0m[38;5;14m[1mSystems[0m[38;5;14m[1m [0m[38;5;14m[1mat[0m[38;5;14m[1m [0m[38;5;14m[1mScale[0m[38;5;12m [39m[38;5;12m(https://www.paloaltonetworks.com/blog/prisma-cloud/repository-webhook-abuse-access-ci-cd-systems-at-scale/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mRepository[39m[38;5;12m [39m[38;5;12mwebhooks,[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mtrigger[39m[38;5;12m [39m[38;5;12mCI/CD[39m[38;5;12m [39m[38;5;12mpipelines,[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m
|
||||
[38;5;12mabused[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12maccess[39m[38;5;12m [39m[38;5;12minternal[39m[38;5;12m [39m[38;5;12msystems.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBypassing required reviews using GitHub Actions[0m[38;5;12m (https://medium.com/cider-sec/bypassing-required-reviews-using-github-actions-6e1b29135cc7) - GitHub Actions can bypass required reviews, allowing malicious code pushes to protected branches.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mForging[0m[38;5;14m[1m [0m[38;5;14m[1msigned[0m[38;5;14m[1m [0m[38;5;14m[1mcommits[0m[38;5;14m[1m [0m[38;5;14m[1mon[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;12m [39m[38;5;12m(https://iter.ca/post/gh-sig-pwn/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mbug[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mGitHub's[39m[38;5;12m [39m[38;5;12mAPI[39m[38;5;12m [39m[38;5;12mallowed[39m[38;5;12m [39m[38;5;12mforging[39m[38;5;12m [39m[38;5;12msigned[39m[38;5;12m [39m[38;5;12mcommits.[39m[38;5;12m [39m[38;5;12mBy[39m[38;5;12m [39m[38;5;12mexploiting[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mregex[39m[38;5;12m [39m[38;5;12mflaw[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12minternal[39m[38;5;12m [39m[38;5;12mCodespaces[39m[38;5;12m [39m[38;5;12mAPI[39m[38;5;12m [39m[38;5;12mendpoint,[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mattacker[39m[38;5;12m [39m[38;5;12mcould[39m[38;5;12m [39m[38;5;12mcreate[39m[38;5;12m [39m[38;5;12mcommits[39m[38;5;12m [39m[38;5;12msigned[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12many[39m[38;5;12m [39m[38;5;12muser,[39m[38;5;12m [39m
|
||||
[38;5;12mdespite[39m[38;5;12m [39m[38;5;12mGitHub's[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mflow[39m[38;5;12m [39m[38;5;12msignature.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGitHub comments abused to push malware via Microsoft repo URLs[0m[38;5;12m (https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/) - Hidden GitHub comment link.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow a Single Vulnerability Can Bring Down the JavaScript Ecosystem[0m[38;5;12m (https://www.landh.tech/blog/20240603-npm-cache-poisoning/) - Cache poisoning attack on the NPM registry rendering packages unavailable.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOne[0m[38;5;14m[1m [0m[38;5;14m[1mSupply[0m[38;5;14m[1m [0m[38;5;14m[1mChain[0m[38;5;14m[1m [0m[38;5;14m[1mAttack[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mRule[0m[38;5;14m[1m [0m[38;5;14m[1mThem[0m[38;5;14m[1m [0m[38;5;14m[1mAll[0m[38;5;14m[1m [0m[38;5;14m[1m–[0m[38;5;14m[1m [0m[38;5;14m[1mPoisoning[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub's[0m[38;5;14m[1m [0m[38;5;14m[1mRunner[0m[38;5;14m[1m [0m[38;5;14m[1mImages[0m[38;5;12m [39m[38;5;12m(https://adnanthekhan.com/2023/12/20/one-supply-chain-attack-to-rule-them-all/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcritical[39m[38;5;12m [39m[38;5;12mvulnerability[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mActions,[39m[38;5;12m [39m[38;5;12minvolving[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mmisconfigured[39m[38;5;12m [39m[38;5;12mself-hosted[39m[38;5;12m [39m
|
||||
[38;5;12mrunner[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mactions/runner-images[39m[38;5;12m [39m[38;5;12mrepository,[39m[38;5;12m [39m[38;5;12mallowed[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mcompromise[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mAzure[39m[38;5;12m [39m[38;5;12mhosted[39m[38;5;12m [39m[38;5;12mrunner[39m[38;5;12m [39m[38;5;12mimages.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPR sneaking[0m[38;5;12m (https://github.com/mortenson/pr-sneaking) - Methods of sneaking malicious code into GitHub pull requests.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRemove evidence of malicious pull requests on GitHub[0m[38;5;12m (https://x.com/adnanthekhan/status/1829116171045474374) - Changing account's email to block-listed domain, automatically bans the account.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mStarJacking[0m[38;5;14m[1m [0m[38;5;14m[1m–[0m[38;5;14m[1m [0m[38;5;14m[1mMaking[0m[38;5;14m[1m [0m[38;5;14m[1mYour[0m[38;5;14m[1m [0m[38;5;14m[1mNew[0m[38;5;14m[1m [0m[38;5;14m[1mOpen[0m[38;5;14m[1m [0m[38;5;14m[1mSource[0m[38;5;14m[1m [0m[38;5;14m[1mPackage[0m[38;5;14m[1m [0m[38;5;14m[1mPopular[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mSnap[0m[38;5;12m [39m[38;5;12m(https://checkmarx.com/blog/starjacking-making-your-new-open-source-package-popular-in-a-snap/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mStarJacking[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtechnique[39m[38;5;12m [39m[38;5;12mwhere[39m[38;5;12m [39m[38;5;12mattackers[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mopen-source[39m[38;5;12m [39m[38;5;12mpackages[39m
|
||||
[38;5;12mappear[39m[38;5;12m [39m[38;5;12mpopular.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThe massive bug at the heart of the npm ecosystem[0m[38;5;12m (https://blog.vlt.sh/blog/the-massive-hole-in-the-npm-ecosystem) - NPM Manifest Confusion.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTrojan Source[0m[38;5;12m (https://trojansource.codes/) - Rather than inserting logical bugs, adversaries can attack the encoding of source code files to inject vulnerabilities.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mUnpinnable[0m[38;5;14m[1m [0m[38;5;14m[1mActions:[0m[38;5;14m[1m [0m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mMalicious[0m[38;5;14m[1m [0m[38;5;14m[1mCode[0m[38;5;14m[1m [0m[38;5;14m[1mCan[0m[38;5;14m[1m [0m[38;5;14m[1mSneak[0m[38;5;14m[1m [0m[38;5;14m[1minto[0m[38;5;14m[1m [0m[38;5;14m[1mYour[0m[38;5;14m[1m [0m[38;5;14m[1mGitHub[0m[38;5;14m[1m [0m[38;5;14m[1mActions[0m[38;5;14m[1m [0m[38;5;14m[1mWorkflows[0m[38;5;12m [39m[38;5;12m(https://www.paloaltonetworks.com/blog/prisma-cloud/unpinnable-actions-github-security/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGitHub[39m[38;5;12m [39m[38;5;12mActions,[39m[38;5;12m [39m[38;5;12meven[39m[38;5;12m [39m[38;5;12mwhen[39m[38;5;12m [39m[38;5;12mpinned[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcommit[39m[38;5;12m [39m[38;5;12mSHA,[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mstill[39m[38;5;12m [39m[38;5;12mpull[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m
|
||||
[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12mmutable[39m[38;5;12m [39m[38;5;12mdependencies[39m[38;5;12m [39m[38;5;12mlike[39m[38;5;12m [39m[38;5;12mDocker[39m[38;5;12m [39m[38;5;12mimages,[39m[38;5;12m [39m[38;5;12munlocked[39m[38;5;12m [39m[38;5;12mpackages,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mexternal[39m[38;5;12m [39m[38;5;12mscripts.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWhy[0m[38;5;14m[1m [0m[38;5;14m[1mnpm[0m[38;5;14m[1m [0m[38;5;14m[1mlockfiles[0m[38;5;14m[1m [0m[38;5;14m[1mcan[0m[38;5;14m[1m [0m[38;5;14m[1mbe[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m[38;5;14m[1mblindspot[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1minjecting[0m[38;5;14m[1m [0m[38;5;14m[1mmalicious[0m[38;5;14m[1m [0m[38;5;14m[1mmodules[0m[38;5;12m [39m[38;5;12m(https://snyk.io/blog/why-npm-lockfiles-can-be-a-security-blindspot-for-injecting-malicious-modules/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMalicious[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12minjected[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mnpm[39m[38;5;12m [39m[38;5;12mprojects[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12mlockfiles[39m
|
||||
[38;5;12m(package-lock.json[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12myarn.lock)[39m[38;5;12m [39m[38;5;12mbecause[39m[38;5;12m [39m[38;5;12mthese[39m[38;5;12m [39m[38;5;12mlarge,[39m[38;5;12m [39m[38;5;12mmachine-generated[39m[38;5;12m [39m[38;5;12mfiles[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mrarely[39m[38;5;12m [39m[38;5;12mreviewed[39m[38;5;12m [39m[38;5;12mthoroughly.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWorking as unexpected[0m[38;5;12m (https://www.chainguard.dev/unchained/working-as-unexpected) - Creating a GitHub branch that matches a branch protection rule pattern with a workflow file that triggers on push to gain access to environment secrets.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mZuckerpunch - Abusing Self Hosted GitHub Runners at Facebook[0m[38;5;12m (https://marcyoung.us/post/zuckerpunch/) - Hide commits in a GitHub PR.[39m
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mADOKit[0m[38;5;12m (https://github.com/xforcered/ADOKit) - Azure DevOps Services Attack Toolkit.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGato[0m[38;5;12m (https://github.com/praetorian-inc/gato) - GitHub Attack Toolkit.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGato-X[0m[38;5;12m (https://github.com/AdnaneKhan/Gato-X) - GitHub Attack Toolkit - Extreme Edition.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGH Archive[0m[38;5;12m (https://www.gharchive.org/) - A project to record the public GitHub timeline, archive it, and make it easily accessible for further analysis.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGHTorrent Project[0m[38;5;12m (http://ghtorrent-downloads.ewi.tudelft.nl/mysql/) - A queryable offline mirror of the GitHub API data. [39m[38;5;14m[1mTutorial[0m[38;5;12m (https://ghtorrent.github.io/tutorial/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mgit-dumper[0m[38;5;12m (https://github.com/arthaud/git-dumper) - Dump Git repository from a website.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGitFive[0m[38;5;12m (https://github.com/mxrch/gitfive) - OSINT tool to investigate GitHub profiles.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGrep.app[0m[38;5;12m (https://grep.app/) - Search GitHub using regex.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mJenkins Attack Framework[0m[38;5;12m (https://github.com/Accenture/jenkins-attack-framework) - This tool can manage Jenkins tasks, like listing jobs, dumping credentials, running commands/scripts, and managing API tokens.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNord Stream[0m[38;5;12m (https://github.com/synacktiv/nord-stream) - A tool to extract secrets stored inside CI/CD environments.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpwn_jenkins[0m[38;5;12m (https://github.com/gquere/pwn_jenkins) - Notes about attacking Jenkins servers.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecrets Patterns Database[0m[38;5;12m (https://github.com/mazen160/secrets-patterns-db) - The largest open-source database for detecting secrets, API keys, passwords, tokens, and more. [39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSourcegraph[0m[38;5;12m (https://sourcegraph.com/search) - A web-based code search and navigation tool for public repositories.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mToken-Spray[0m[38;5;12m (https://blog.projectdiscovery.io/nuclei-v2-5-3-release/) - Automate token validation using Nuclei.[39m
|
||||
|
||||
[38;2;255;187;0m[4mCase Studies[0m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1m10[0m[38;5;14m[1m [0m[38;5;14m[1mreal-world[0m[38;5;14m[1m [0m[38;5;14m[1mstories[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mhow[0m[38;5;14m[1m [0m[38;5;14m[1mwe've[0m[38;5;14m[1m [0m[38;5;14m[1mcompromised[0m[38;5;14m[1m [0m[38;5;14m[1mCI/CD[0m[38;5;14m[1m [0m[38;5;14m[1mpipelines[0m[38;5;12m [39m[38;5;12m(https://research.nccgroup.com/2022/01/13/10-real-world-stories-of-how-weve-compromised-ci-cd-pipelines/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mExamples[39m[38;5;12m [39m[38;5;12minclude[39m[38;5;12m [39m[38;5;12mexploiting[39m[38;5;12m [39m[38;5;12mS3[39m[38;5;12m [39m[38;5;12mmisconfigurations,[39m[38;5;12m [39m[38;5;12mJenkins[39m[38;5;12m [39m[38;5;12mplugin[39m[38;5;12m [39m[38;5;12mflaws,[39m[38;5;12m [39m
|
||||
[38;5;12mGitLab[39m[38;5;12m [39m[38;5;12mrunner[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalations,[39m[38;5;12m [39m[38;5;12mKubernetes[39m[38;5;12m [39m[38;5;12mpod[39m[38;5;12m [39m[38;5;12mannotation[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcompromised[39m[38;5;12m [39m[38;5;12mdeveloper[39m[38;5;12m [39m[38;5;12mlaptops.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGitHub Actions Attack Diagram[0m[38;5;12m (https://github.com/jstawinski/GitHub-Actions-Attack-Diagram) - Includes public vulnerability research presented at Black Hat USA 2024 and DEF CON 32.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPlaying[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mFire[0m[38;5;14m[1m [0m[38;5;14m[1m–[0m[38;5;14m[1m [0m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mWe[0m[38;5;14m[1m [0m[38;5;14m[1mExecuted[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mCritical[0m[38;5;14m[1m [0m[38;5;14m[1mSupply[0m[38;5;14m[1m [0m[38;5;14m[1mChain[0m[38;5;14m[1m [0m[38;5;14m[1mAttack[0m[38;5;14m[1m [0m[38;5;14m[1mon[0m[38;5;14m[1m [0m[38;5;14m[1mPyTorch[0m[38;5;12m [39m[38;5;12m(https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mResearchers[39m[38;5;12m [39m[38;5;12mexploited[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcritical[39m[38;5;12m [39m[38;5;12mPyTorch[39m[38;5;12m [39m
|
||||
[38;5;12mvulnerability[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mpull[39m[38;5;12m [39m[38;5;12mrequest[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexecute[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mself-hosted[39m[38;5;12m [39m[38;5;12mrunners.[39m
|
||||
|
||||
[38;2;255;187;0m[4mSimilar Projects[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mCommon Threat Matrix for CI/CD Pipeline[0m[38;5;12m (https://github.com/rung/threat-matrix-cicd)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mOpen Software Supply Chain Attack Reference (OSC&R)[0m[38;5;12m (https://pbom.dev/)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRisk Explorer for Software Supply Chains[0m[38;5;12m (https://riskexplorer.endorlabs.com/#/attack-tree)[39m
|
||||
|
||||
[38;5;12mcicdattacks Github: https://github.com/TupleType/awesome-cicd-attacks[39m
|
||||
Reference in New Issue
Block a user