BTC $63588.8454
ETH $3318.4662
BNB $604.7548
SOL $141.9500
stETH $3316.4189
XRP $0.5199
DOGE $0.1499
TON $5.5017
ADA $0.4672
AVAX $34.8288
wstETH $3864.9517
TRX $0.1206
WETH $3317.8076
WBTC $63661.5187
DOT $6.8523
BCH $479.3871
LINK $14.1061
MATIC $0.7331
UNI $8.1733
ICP $13.7123
LTC $85.0600
DAI $0.9997
CAKE $2.7667
FDUSD $1.0007
NEAR $7.2253
RNDR $8.1828
IMX $2.1519
ETC $29.0090
HBAR $0.1064
STX $2.5311
MNT $1.1107
FIL $6.0424
PEPE $0.0000
OKB $52.0401
VET $0.0399
TAO $433.9793
MKR $3084.4945
KAS $0.1204
WIF $2.7559
ATOM $8.3314
GRT $0.2637
FET $2.2132
AR $36.9603
INJ $26.2650
USDE $0.9986
XLM $0.1138
THETA $2.2928
BTC $63588.8454
ETH $3318.4662
BNB $604.7548
SOL $141.9500
stETH $3316.4189
XRP $0.5199
DOGE $0.1499
TON $5.5017
ADA $0.4672
AVAX $34.8288
wstETH $3864.9517
TRX $0.1206
WETH $3317.8076
WBTC $63661.5187
DOT $6.8523
BCH $479.3871
LINK $14.1061
MATIC $0.7331
UNI $8.1733
ICP $13.7123
LTC $85.0600
DAI $0.9997
CAKE $2.7667
FDUSD $1.0007
NEAR $7.2253
RNDR $8.1828
IMX $2.1519
ETC $29.0090
HBAR $0.1064
STX $2.5311
MNT $1.1107
FIL $6.0424
PEPE $0.0000
OKB $52.0401
VET $0.0399
TAO $433.9793
MKR $3084.4945
KAS $0.1204
WIF $2.7559
ATOM $8.3314
GRT $0.2637
FET $2.2132
AR $36.9603
INJ $26.2650
USDE $0.9986
XLM $0.1138
THETA $2.2928
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • A new vulnerability in GitHub could affect the software supply chain


    Researchers at security company Legit Security have discovered that an attacker is pushing changes to an open source repository on GitHub. This can cause software projects that include the latest version of a component to compile updates with malicious code.

    This artifact poisoning vulnerability could affect software projects using GitHub Actions (a service for automating development pipelines) by triggering the build process at the moment a change is detected in a software dependency, experts say.

    Legit Security simulated an attack on the project that Rust is based on, resulting in the project being recompiled using a malicious version of the popular GCC software library.

    The attack uses an automated build process via GitHub Actions. A vulnerable pattern could allow an attacker to execute code in a privileged manner within the development pipeline, stealing repository secrets and spoofing code.

    In other words, in a vulnerable workflow, any GitHub user can create a fork that will create an artifact. Then you need to inject this artifact into the original repository build process and modify its output.

    Once exploited, an attacker can modify repository branches, pull requests, exploit bugs, releases, and all objects available for workflow token permissions. Since Rust did not restrict the workflow token to certain areas, the following permissions are available to a hacker:

    Depending on the specific configuration of Rust, a cybercriminal can use these permissions to extend the attack beyond the vulnerable repository to additional Rust assets and lateral movement within the organization.

    Legit Security CTO Liav Caspi said the problem affects a large number of open source projects because maintainers typically test the provided code first and analyze it after the tests.

    GitHub has confirmed the issue and paid a reward for the information, and Rust has already patched the vulnerability.

    Author DeepWeb
    Akamai researchers accidentally disabled KmsdBot botnet
    Shadow archivists are concerned about the active hunt for online libraries

    Comments 0

    Add comment