BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Harvesting GitLab Pipeline Secrets
/in General NewsMany organizations use (self-hosted) GitLab instances to manage their source code and a lot of infrastructure is managed in code (IaC), thus these configurations must be source-controlled as well, putting a lot of responsibility on the source code platform in use. Often deployments are automated using CI/CD pipeline jobs. Each of these jobs has a log that users can access, and it is usually public. As these projects must handle secrets securely there is a lot of room for configuration errors.
CI/CD Variable Handling
Usually, developers configure their secret variables in the GitLab CI/CD Variables Settings. For each variable, there are multiple security-related configuration options.
Visibility
Flags
Setting these as restrictive as possible is crucial as the job logs are usually public.
Many reasons exist why credentials might be leaked in the job output. Moreover, it is important to review generated artifacts as well. It is possible that credentials are not logged in the output but later saved in job artifacts, that can be downloaded.
Typical Job Misconfigurations
The most obvious misconfiguration is logging sensitive values in the job output e.g. for debugging purposes and not protecting the values as described above. The following examples are real-world scenarios of job outputs.
Another common issue is setting e.g. a tool’s verbosity to a debug level and not realizing that it does start to log sensitive values.
In reality, there are tons of variations of these issues.
Harvesting Secrets
Now finding these secrets is quite cumbersome as groups and projects can contain a lot of jobs, that’s why we introduce you to Pipeleak.
Pipeleak automatically scans job logs for secrets. Its ruleset can be easily extended and it offers a Trufflehog integration, which allows finding verified credentials.
The Pipeleak scanner generates a log output printing any findings. In this example Pipeleak scans only jobs of projects that the current user is a member of and which match the search query
secret-pipelines, filtering the results tohighandhigh-verifiedonly.Pipeleak can search the textual output of the job log (
HIT) and it will scan the generated artifact files as well (HIT Artifact). If an artifact is an archive it will scan the included files (HIT Artifact (in archive)). Moreover, it can scan Dotenv artifacts, which is a report that collects a set of environment variables as artifacts. Finally, you can review the findings and then abuse the newly found credentials in your engagement.Pipeleak offers additional features like GitLab runners enumeration, accessible CI/CD variables enumeration, and a vulnerability checker. For more information and more extensive docs check out the project on GitHub.
Happy Scanning!
Compass Security Blog – Read More
Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads
/in General NewsA newly discovered malware campaign has been found to target private users, retailers, and service businesses mainly located in Russia to deliver NetSupport RAT and BurnsRAT.
The campaign, dubbed Horns&Hooves by Kaspersky, has hit more than 1,000 victims since it began around March 2023. The end goal of these attacks is to leverage the access afforded by these trojans to install stealer
The Hacker News – Read More
Energy industry contractor says ransomware attack has limited access to IT systems
/in General NewsThe company, ENGlobal Corporation, has restricted employee access to its IT system, limiting it to only essential business operations.
The Record from Recorded Future News – Read More
How Attackers Use Corrupted Files to Slip Past Security
/in General NewsNew zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN’s sandbox detects and…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
‘Bootkitty’ First Bootloader to Take Aim at Linux
/in General NewsThough it’s still just a proof of concept, the malware is functional and can evade the Secure Boot process on devices from multiple vendors.
darkreading – Read More
Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform
/in General NewsTel Aviv, ISRAEL, 2nd December 2024, CyberNewsWire
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Report: Chinese lidar technology poses national security threat
/in General NewsLidar, now used globally in a wide variety of civilian and military use cases, “stands at the center of Beijing’s bid for technological superiority,” the report says, warning that Chinese companies are taking control of the global lidar market.
The Record from Recorded Future News – Read More
Japanese crypto service shuts down after theft of bitcoin worth $308 million
/in General NewsDMM Bitcoin said that it planned to transfer all customer accounts and company assets to the crypto firm SBI VC Trade after a hacking incident in May.
The Record from Recorded Future News – Read More
New Rockstar 2FA Phishing-as-a-Service Kit Targets Microsoft 365 Accounts
/in General NewsSUMMARY Cybersecurity researchers at Trustwave have discovered “Rockstar 2FA,” a phishing-as-a-service platform designed to help hackers and script…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Interpol Cyber-Fraud Action Nets More Than 5K Arrests
/in General NewsChalk up another win for global cooperation among law enforcement, this time targeting seven types of cyber fraud, including voice phishing and business email compromise.
darkreading – Read More