In the Git Hub actions if they do not have their actions locked for a specific revision, if a malicious change is made to a third party action, this change will be included in the next build that is run for any project that uses that action.
Modify the workflow to execute tasks that steal data, introduce security vulnerabilities or perform harmful actions in the target environment.
Use mechanisms such as git-commits, or artifacts and hashes to verify the data integrity.
Authenticated attacker with access from the internet with write access to the provider's relays.
⌚ 15 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
actions with locking
- uses: actions/checkout@v3
ref: f095bcc56b7c2baf48f3ac70d6d6782f4f553222
actions
- uses: actions/checkout@v3