Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

House Republicans are proposing $5 billion for private school vouchers

Trump signs executive order to lower prescription drug prices | Donald Trump News

Harvard says it will not abandon the “nuclear” principle to meet the Department of Education’s requirements

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » CISA warns of aggressive exploitation in compromises in GitHub action supply chain
Identity

CISA warns of aggressive exploitation in compromises in GitHub action supply chain

userBy userMarch 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 19, 2025Ravi LakshmananVulnerability / devsecops

GitHub Action Supply Chain Compromise

The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability related to supply chain compromises for GitHub Action, TJ Action/Change Files.

A high-strength flaw tracked as CVE-2025-30066 (CVSS score: 8.6) involves violations of Github actions and injects malicious code that allows remote attackers to access sensitive data via action logs.

“The TJ-actions/Chanded-Files Github actions contain an embedded malicious code vulnerability that allows remote attackers to discover secrets by reading the action log,” CISA said in an alert.

Cybersecurity

“These secrets may include, but are not limited to, a valid AWS access key, a GitHub Personal Access Token (PAT), an NPM token, and a private RSA key.”

Cloud security company Wiz has revealed that attacks could be an example of cascaded supply chain attacks. Unidentified threat actors first compromised review dog/action setup @v1 github actions that permeate TJ-actions/change files.

“TJ-actions/eslint-changed-files uses ReviewDog/Action-Setup@v1, and the TJ-actions/Changed-Files repository performs this TJ-actions/eslint-changed-files action with a personal access token.” “A review dog’s action has been compromised in roughly the same time window as TJ-actions compromised.”

It is not clear at the moment how this was done. However, the compromise is said to have occurred on March 11, 2025. The TJ Action/Modified File Violation occurred at some point before March 14th.

This means that you can use an infected ReviewDog action to insert malicious code into your CI/CD workflow using it. In this case, the base64-encoded payload added to the file named install.sh used in the workflow.

As with TJ actions, the payload is designed to expose secrets from the repository running the workflow in the log. This issue only affects one tag (V1) in ReviewDog/Action-Setup.

TJ Action maintainers revealed that the attack was a result of a compromised Github Personal Access Token (PAT), allowing attackers to modify the repository with malicious code.

Cybersecurity

“Attackers can tell you that they have gained enough access to update the V1 tag to malicious code that has placed it on the repository’s fork,” McCarthy said.

“ReviewDog Github organizations have a relatively large contributor base and appear to be actively adding contributors through automated invitations. This increases the attack surface because contributor access has been compromised or contributor access has been maliciously acquired.”

In light of the compromise, affected users and federal agencies are encouraged to update to the latest version of the TJ-actions/change file (46.0.1) by April 4, 2025 to ensure their networks are secured from active threats. However, given the underlying cause, there is a risk of recurrence.

In addition to replacing affected actions with a safer alternative, we recommend auditing past workflows for suspicious activities, rotating leaked secrets, and pinning all github actions to a specific commit hash instead of version tags.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump Administration Releases Thousands of Files on the Assassination of JFK | Donald Trump News
Next Article KnockNoc raises seed funding to expand just-in-time network access control technology
user
  • Website

Related Posts

The defect in the asus patch driverhub rce can be exploited via http.

May 12, 2025

Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

May 12, 2025

Why the published credentials remain unfixed and how to change them

May 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

House Republicans are proposing $5 billion for private school vouchers

Trump signs executive order to lower prescription drug prices | Donald Trump News

Harvard says it will not abandon the “nuclear” principle to meet the Department of Education’s requirements

Slate Auto exceeds 100,000 refundable bookings in 2 weeks

Trending Posts

Trump signs executive order to lower prescription drug prices | Donald Trump News

May 12, 2025

Can Istanbul talk about how to pave the war in Ukraine? |News on the Russian-Ukraine War

May 12, 2025

Hamas frees soldier Edan Alexander as Gaza faces risks of artillery fire, starvation | Israeli-Palestinian conflict news

May 12, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AB DAO and AB Charity Foundation work together to build trustworthy infrastructure and promote global philanthropy

Top tech startup funding news for today, May 12, 2025

Israeli startup Classiq raises $110 million to become “microsoft in quantum computing.”

Omada’s health file to be published amid a virtual care startup IPO drought

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.