SYM_CONF_0022 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki
Improper Control of Dynamically-Managed Code Resources
Property | Value |
---|---|
Language | |
Severity | |
CWE | CWE-913: Improper Control of Dynamically-Managed Code Resources |
OWASP | A01:2021 - Broken Access Control |
Confidence Level | Low |
Impact Level | Medium |
Likelihood Level | Low |
Description
This GitHub Actions workflow uses 'pull_request_target' and checks out code from incoming pull requests, which can execute untrusted code with access to repository secrets. This allows code from external contributors to run in a privileged context.
Impact
An attacker could create a pull request that steals secrets like API keys or deployment credentials, leading to source code leaks, unauthorized access, or further compromise of your repository and infrastructure.