<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Github_actions — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/github_actions/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/github_actions/feed.xml" rel="self" type="application/rss+xml"/><item><title>sherlock-project/sherlock GitHub Actions RCE via pull_request_target Injection (CVE-2026-44590)</title><link>https://feed.craftedsignal.io/briefs/2024-01-sherlock-rce/</link><pubDate>Wed, 03 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sherlock-rce/</guid><description>A command injection vulnerability, identified as CVE-2026-44590, exists in the `validate_modified_targets.yml` GitHub Actions workflow of sherlock-project/sherlock. A malicious pull request can trigger arbitrary command execution in the privileged CI context, allowing attackers to exfiltrate the GITHUB_TOKEN and auto-approve the malicious PR without human interaction, effectively leading to a supply chain compromise.</description><content:encoded><![CDATA[<p>CVE-2026-44590 is a critical command injection vulnerability found in the <code>validate_modified_targets.yml</code> GitHub Actions workflow of the sherlock-project/sherlock repository. Discovered and reported by Astaruf, this vulnerability allows any GitHub user to open a pull request that triggers arbitrary command execution within the privileged Continuous Integration (CI) environment. The vulnerability stems from the <code>pull_request_target</code> event, which, without proper input sanitization, permits the injection of malicious commands into the workflow. This exploit allows attackers to exfiltrate the <code>GITHUB_TOKEN</code> and automatically approve malicious pull requests, potentially leading to supply chain compromise without any human review. The proof-of-concept (PoC) automates the entire attack chain, highlighting the severity and ease of exploitation of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker forks the <code>sherlock-project/sherlock</code> repository.</li>
<li>Attacker creates a malicious branch with a crafted payload designed to inject commands into the <code>validate_modified_targets.yml</code> workflow.</li>
<li>The attacker opens a pull request (PR) targeting the <code>master</code> branch of their fork, triggering the <code>pull_request_target</code> event.</li>
<li>The GitHub Actions workflow executes the injected payload, which can include commands to exfiltrate sensitive information.</li>
<li>The injected payload extracts the <code>GITHUB_TOKEN</code> from the workflow environment by reading <code>git config --list</code>.</li>
<li>The stolen <code>GITHUB_TOKEN</code> is used to authenticate against the GitHub API.</li>
<li>The attacker uses the stolen token to automatically approve the malicious pull request via the GitHub API, specifically the <code>POST /repos/{owner}/{repo}/pulls/{pull_number}/reviews</code> endpoint.</li>
<li>The malicious PR is merged, resulting in a supply chain compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44590 can lead to a full supply chain compromise. An attacker could inject malicious code into the <code>sherlock-project/sherlock</code> repository (or forks thereof), potentially affecting all users of the software. The automated nature of the attack, involving token exfiltration and automatic PR approval, significantly increases the risk, reducing the need for manual interaction.  The impact is substantial as it allows for code injection into the project&rsquo;s codebase, potentially affecting all downstream users and dependencies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor GitHub Actions workflow execution logs for unusual command invocations, particularly those involving <code>git config --list</code>, using a webserver rule on product <code>linux</code> that examines HTTP request headers.</li>
<li>Implement input validation and sanitization in GitHub Actions workflows, particularly when using the <code>pull_request_target</code> trigger, to prevent command injection as described in CVE-2026-44590.</li>
<li>Enforce strict branch protection rules and require code review by multiple trusted developers before merging any pull requests, even those approved by GitHub Actions.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Sherlock GitHub Actions Workflow Activity</code> to detect potential exploitation attempts by monitoring process creation events.</li>
<li>Review and audit existing GitHub Actions workflows for similar vulnerabilities and apply necessary security patches or mitigations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>github_actions</category><category>rce</category><category>supply_chain</category></item></channel></rss>