MITRE and Splunk Expose Critical Vulnerabilities in Open Source GitHub Actions

MITRE and Splunk Expose Critical Vulnerabilities in Open Source GitHub Actions

The Sysdig TRT has uncovered critical vulnerabilities in the GitHub Actions workflows of several high-profile open source projects, including those maintained by MITRE and Splunk.

GitHub Actions, a popular platform for automating CI/CD pipelines, offers immense flexibility for developers but also harbors significant security risks when improperly configured.

High-Profile Projects Compromised

The Sysdig TRT’s proactive hunt for real-world threats exposed how insecure workflows, particularly those using the pull_request_target trigger, can be exploited to access sensitive secrets and high-privilege tokens, potentially leading to full repository takeovers.

– Advertisement –
Google News

This discovery underscores a persistent gap in CI/CD security practices across even the most reputable open source communities.

The core of these vulnerabilities lies in the misuse of the pull_request_target event in GitHub Actions, which runs workflows in the context of the base branch with access to repository secrets and a default high-privilege GITHUB_TOKEN.

Unlike the safer pull_request event, this trigger can execute untrusted code from public forks, creating a direct path for attackers to inject malicious scripts.

Exploiting pull_request_target for Malicious Access

The Sysdig TRT demonstrated this flaw in projects like spotipy-dev/spotipy, a Python library for Spotify with over 5,200 stars, where a malicious setup.py file enabled secret exfiltration via a memory-dumping script, earning a critical CVE designation (CVE-2025-47928).

Open Source Projects
memdump.py

Similarly, MITRE’s Cyber Analytics Repository (CAR) fell prey to an almost identical exploit through its dependency installation process, allowing attackers to harvest privileged tokens.

Splunk’s security_content repository also exposed sensitive credentials, though the extracted GITHUB_TOKEN was scoped to read-only access.

Despite responsible disclosure, responses from affected organizations varied, with MITRE and Spotipy swiftly patching their workflows, while Splunk’s resolution status remains less clear despite a fix.

The implications of these findings are profound, as the Sysdig TRT accessed dozens of repositories using basic exploitation techniques, revealing a systemic lack of security hardening.

pull_request_target workflows often handle untrusted code without adequate safeguards, exposing secrets like API keys that can escalate privileges or enable lateral movement within an organization.

To mitigate such risks, Sysdig recommends avoiding pull_request_target unless absolutely necessary and fully understood.

Safer alternatives include splitting workflows into unprivileged and privileged components, using the pull_request event for initial processing, and restricting GITHUB_TOKEN permissions to minimal levels, such as read-only access to contents.

Additional measures, like runtime threat detection with tools like Falco Actions, can identify malicious behaviors such as unauthorized network connections or credential harvesting—during workflow execution.

These incidents serve as a wake-up call for the open source community to prioritize CI/CD security, adopting stringent best practices to prevent supply chain attacks that exploit trusted workflows as entry points for broader compromise.

As Sysdig continues to collaborate with developers to remediate vulnerabilities, the urgency to secure GitHub Actions remains paramount for safeguarding the integrity of collaborative software development.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link