adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare

Preview meta tags from the adnanthekhan.com website.

Linked Hostnames

15

Thumbnail

Search Engine Appearance

Google

https://adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare

CVE-2023-49291 and More - A Potential Actions Nightmare

Introduction I’ve been doing a lot of scanning and reporting of GitHub Actions injection and pwn request vulnerabilities throughout GitHub. Most of my scanning and testing focused on workflows - that is yaml files in the .github/workfows directory - and my regexes didn’t look at files in other directories, such action.yml, which is used as the entry-point for any repository that functions as a reusable GitHub Action. At Defcon Asi Greenholts and his team from Palo Alto Networks outlined the risk of a compromise of a reusable GitHub Action and how an attacker can exploit an action for an initial foothold, and then poison specific tags in order to target other actions and repositories. That talk had me think about looking for issues in reusable actions themselves.



Bing

CVE-2023-49291 and More - A Potential Actions Nightmare

https://adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare

Introduction I’ve been doing a lot of scanning and reporting of GitHub Actions injection and pwn request vulnerabilities throughout GitHub. Most of my scanning and testing focused on workflows - that is yaml files in the .github/workfows directory - and my regexes didn’t look at files in other directories, such action.yml, which is used as the entry-point for any repository that functions as a reusable GitHub Action. At Defcon Asi Greenholts and his team from Palo Alto Networks outlined the risk of a compromise of a reusable GitHub Action and how an attacker can exploit an action for an initial foothold, and then poison specific tags in order to target other actions and repositories. That talk had me think about looking for issues in reusable actions themselves.



DuckDuckGo

https://adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare

CVE-2023-49291 and More - A Potential Actions Nightmare

Introduction I’ve been doing a lot of scanning and reporting of GitHub Actions injection and pwn request vulnerabilities throughout GitHub. Most of my scanning and testing focused on workflows - that is yaml files in the .github/workfows directory - and my regexes didn’t look at files in other directories, such action.yml, which is used as the entry-point for any repository that functions as a reusable GitHub Action. At Defcon Asi Greenholts and his team from Palo Alto Networks outlined the risk of a compromise of a reusable GitHub Action and how an attacker can exploit an action for an initial foothold, and then poison specific tags in order to target other actions and repositories. That talk had me think about looking for issues in reusable actions themselves.

  • General Meta Tags

    13
    • title
      CVE-2023-49291 and More - A Potential Actions Nightmare | Adnan Khan's Blog
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1, shrink-to-fit=no
    • robots
      index, follow
  • Open Graph Meta Tags

    7
    • og:url
      https://adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare/
    • og:site_name
      Adnan Khan's Blog
    • og:title
      CVE-2023-49291 and More - A Potential Actions Nightmare
    • og:description
      Introduction I’ve been doing a lot of scanning and reporting of GitHub Actions injection and pwn request vulnerabilities throughout GitHub. Most of my scanning and testing focused on workflows - that is yaml files in the .github/workfows directory - and my regexes didn’t look at files in other directories, such action.yml, which is used as the entry-point for any repository that functions as a reusable GitHub Action. At Defcon Asi Greenholts and his team from Palo Alto Networks outlined the risk of a compromise of a reusable GitHub Action and how an attacker can exploit an action for an initial foothold, and then poison specific tags in order to target other actions and repositories. That talk had me think about looking for issues in reusable actions themselves.
    • og:locale
      en-us
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:image
      https://adnanthekhan.com/wp-content/uploads/2024/01/tj_chain.png
    • twitter:title
      CVE-2023-49291 and More - A Potential Actions Nightmare
    • twitter:description
      Introduction I’ve been doing a lot of scanning and reporting of GitHub Actions injection and pwn request vulnerabilities throughout GitHub. Most of my scanning and testing focused on workflows - that is yaml files in the .github/workfows directory - and my regexes didn’t look at files in other directories, such action.yml, which is used as the entry-point for any repository that functions as a reusable GitHub Action. At Defcon Asi Greenholts and his team from Palo Alto Networks outlined the risk of a compromise of a reusable GitHub Action and how an attacker can exploit an action for an initial foothold, and then poison specific tags in order to target other actions and repositories. That talk had me think about looking for issues in reusable actions themselves.
  • Link Tags

    7
    • apple-touch-icon
      https://adnanthekhan.com/apple-touch-icon.png
    • canonical
      https://adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare/
    • icon
      https://adnanthekhan.com/favicon.ico
    • icon
      https://adnanthekhan.com/favicon-16x16.png
    • icon
      https://adnanthekhan.com/favicon-32x32.png
  • Website Locales

    1
    • EN country flagen
      https://adnanthekhan.com/2024/01/10/cve-2023-49291-and-more-a-potential-actions-nightmare/

Links

29