You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi Adnan, thank you so much for this PoC and the related blog post! Super interesting!
If I got everything from your findings, could we state that a general procedure to avoid being hit by a cache poisoning attack is never restoring caches from the main branch, regardless the Workflow?
Hi @ubiratansoares, the correct procedure for avoiding a cache poisoning attack is to never run untrusted/unreviewed code in the context of the default branch of a repository (typically main).
This technique applies to any action that builds on top of actions/toolkit. In particular the cache hit and unzip part of it.
Hi Adnan, thank you so much for this PoC and the related blog post! Super interesting!
If I got everything from your findings, could we state that a general procedure to avoid being hit by a cache poisoning attack is never restoring caches from the main branch, regardless the Workflow?
In addition, is this a vulnerability only related to
actions/restore
provided by Github, or would it impact any other public GHA that build on top of commonactions/toolkit
building blocks (eg, https://github.com/gradle/actions/blob/main/setup-gradle/action.yml )?Thanks in advance!
The text was updated successfully, but these errors were encountered: