GitHub Workflow Detected

medium Web App Scanning Plugin ID 114568

Synopsis

GitHub Workflow Detected

Description

GitHub Actions are a feature from the popular GitHub platform for automating software development workflows directly within a GitHub source code repository. By defining one or more workflows files in the `/.github/` directory of their repositories, developers can customize their applications build workflows.

When exposed with the web application and especially for private repositories workflows, this file can be used by an attacker to gain access to sensitive information.

Solution

Ensure that the detected workflow file file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.

See Also

https://docs.github.com/en/actions/writing-workflows

https://github.com/

Plugin Details

Severity: Medium

ID: 114568

Type: remote

Published: 1/28/2025

Updated: 1/28/2025

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information