CISA KEV 정보
| 취약점명 | tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability |
|---|---|
| 설명 | tj-actions/changed-files GitHub Action contains an embedded malicious code vulnerability that allows a remote attacker to discover secrets by reading Github Actions Workflow Logs. These secrets may include, but are not limited to, valid AWS access keys, GitHub personal access tokens (PATs), npm tokens, and private RSA keys. |
| 조치사항 | Apply mitigations as set forth in the CISA instructions linked below. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-506 |
| 등록일 (KEV) | 2025-03-18 |
| 조치 기한 | 2025-04-08 |
| 추가 참고 | This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: CISA Mitigation Instructions: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-tj-actionschanged-files-cve-2025-30066-and-reviewdogaction ; Additional References: https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28 ; https://nvd.nist.gov/vuln/detail/CVE-2025-30066 |
NVD 상세 정보
CVSS v3.1: 8.6 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N설명: tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)
CWE: CWE-506
참조
- https://blog.gitguardian.com/compromised-tj-actions/ [Exploit, Third Party Advisory]
- https://github.com/chains-project/maven-lockfile/pull/1111 [Issue Tracking]
- https://github.com/espressif/arduino-esp32/issues/11127 [Issue Tracking]
- https://github.com/github/docs/blob/962a1c8dccb8c0f66548b324e5b921b5e4fbc3d6/content/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions.md?plain=1#L191-L193 [Product]
- https://github.com/modal-labs/modal-examples/issues/1100 [Issue Tracking]
- https://github.com/rackerlabs/genestack/pull/903 [Issue Tracking]
- https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28 [Product]
- https://github.com/tj-actions/changed-files/issues/2463 [Issue Tracking]
- https://github.com/tj-actions/changed-files/issues/2464 [Issue Tracking]
- https://github.com/tj-actions/changed-files/issues/2477 [Issue Tracking]
- https://news.ycombinator.com/item?id=43367987 [Issue Tracking, Third Party Advisory]
- https://news.ycombinator.com/item?id=43368870 [Issue Tracking, Third Party Advisory]
- https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/ [Third Party Advisory]
- https://sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066/ [Mitigation, Third Party Advisory]
- https://web.archive.org/web/20250315060250/https://github.com/tj-actions/changed-files/issues/2463 [Issue Tracking]
- ... 외 6건
This product uses the NVD API but is not endorsed or certified by the NVD.