Pwn Requests and Injection attacks are an attack type that exploits a vulnerability where a repository runs a workflow on a pull_request_target trigger and proceeds to check out and run code from the PR branch. The CISA has even released a cybersecurity information sheet (CSI) on how organizations can secure their CI/CD pipelines.
•14m read time• From securityboulevard.com
Table of contents
Pwn Requests & Workflow Event Code InjectionFinding Vulnerable Repositoriesmicrosoft/confidential-sidecar-containersmicrosoft/gpt-reviewredhat-performance/quads (and more!)Pwn Requests: A Problem that Just Won’t Go AwayReferencesSort: