By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover
Tech News

GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover

By Viral Trending Content 4 Min Read
Share
SHARE

Aug 15, 2024Ravie LakshmananCloud Security / DevOps

GitHub Vulnerability

A newly discovered attack vector in GitHub Actions artifacts dubbed ArtiPACKED could be exploited to take over repositories and gain access to organizations’ cloud environments.

“A combination of misconfigurations and security flaws can make artifacts leak tokens, both of third party cloud services and GitHub tokens, making them available for anyone with read access to the repository to consume,” Palo Alto Networks Unit 42 researcher Yaron Avital said in a report published this week.

“This allows malicious actors with access to these artifacts the potential of compromising the services to which these secrets grant access.”

Cybersecurity

The cybersecurity company said it primarily observed the leakage of GitHub tokens (e.g., GITHUB_TOKEN and ACTIONS_RUNTIME_TOKEN), which could not only give malicious actors unauthorized access to the repositories, but also grant them the ability to poison the source code and get it pushed to production via CI/CD workflows.

Artifacts in GitHub allow users to share data between jobs in a workflow and persist that information after it has been completed for 90 days. This can include builds, log files, core dumps, test outputs, and deployment packages.

The security problem here is that these artifacts are publicly available for anyone in the case of open-source projects, making them a valuable resource for extracting secrets like GitHub access tokens.

Particularly, the artifacts have been found to expose an undocumented environment variable called ACTIONS_RUNTIME_TOKEN, which has a lifespan of about six hours and could be used to substitute an artifact with a malicious version before it expires.

This could then open an attack window for remote code execution when developers directly download and execute the rogue artifact or there exists a subsequent workflow job that’s configured to run based on previously uploaded artifacts.

While GITHUB_TOKEN expires when the job ends, improvements made to the artifacts feature with version 4 meant that an attacker could exploit race condition scenarios to steal and use the token by downloading an artifact while a workflow run is in progress.

Cybersecurity

The pilfered token could be subsequently used to push malicious code to the repository by creating a new branch before the pipeline job ends and the token is invalidated. However, this attack banks on the workflow having the “contents: write” permission.

A number of open-source repositories related to Amazon Web Services (AWS), Google, Microsoft, Red Hat, and Ubuntu have been found susceptible to the attack. GitHub, for its part, has categorized the issue as informational, requiring that users take it upon themselves to secure their uploaded artifacts.

“GitHub’s deprecation of Artifacts V3 should prompt organizations using the artifacts mechanism to reevaluate the way they use it,” Avital said. “Overlooked elements like build artifacts often become prime targets for attackers.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Humanoid Robots in 2026, Real-World Uses, Pros, and Limits

Big data is transforming gaming experiences in Ireland

Commodore 64 Ultimate Review: An Astonishing Remake

Best New Tablet of the Year: Tech Advisor Awards 2025-26

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

TAGGED: CI/CD Security, Cloud security, Cyber Security, Cybersecurity, DevOps, GitHub, Information security, Internet, Open Source, software development, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Australia’s ASX Faces Lawsuit Over ‘Misleading’ Blockchain Project Claims—Details
Next Article Rapper 50 Cent Nearing Billionaire Status
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Humanoid Robots in 2026, Real-World Uses, Pros, and Limits
Tech News
Ethereum price prediction for January 2026: key levels and institutional moves to watch
Crypto
Last Night in College Basketball: Vandy's Byington is Unreal Before New Year's
Sports
Exclusive: How the deal to get Ukraine a €90 billion EU loan was sealed
World News
Denny Hamlin’s Parents: About His Father Dennis & Mother Mary Lou
Celebrity
Why Crimson Desert Might Be 2026’s Breakout Title
Gaming News
Eurostar cancels all trains out of London as power outage hits Channel Tunnel
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Humanoid Robots in 2026, Real-World Uses, Pros, and Limits

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Humanoid Robots in 2026, Real-World Uses, Pros, and Limits
December 30, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?