By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Microsoft Azure open to New Vulnerabilities
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Microsoft Azure open to New Vulnerabilities
Microsoft Azure
News

Microsoft Azure open to New Vulnerabilities

Last updated: 2020/10/11 at 7:08 PM
Jim Koohyar Biniyaz Published October 11, 2020
Share
Microsoft Azure
SHARE

Two brand new vulnerabilities related to Microsoft Azure have just been revealed by the researchers at Intezer.

Contents
Microsoft Azure: The first vulnerabilityMicrosoft Azure: The second vulnerabilityChapter closed?

The flaws, which existed in a popular cloud service called Azure App Services, specifically impacting Linux servers.

App Services is useful as it allows developers to simply write an application to serve HTTP and then push it to git. From there Azure will handle all deployment details and provide an Azure-managed domain name.

As described in their blog, the first vulnerability enabled an attacker with access to the server to take over the App Service’s git repository and implant phishing pages accessible through the Azure Portal.

The second one,allowed an attacker with an existing low-severity vulnerability on the application (SSRF) to upgrade to full code execution on the App Service and trigger the first vulnerability, as Intezer explained in this PoC:

Microsoft Azure: The first vulnerability

While investigating how webssh connects the web interface to the application node’s SSH service, the researchers noticed it uses hardcoded credentials “root:Docker!” to access the application node:

pasted image 0 22
credit image: Intezer

This poses no danger, they said, since the application node’s SSH port is not accessible from the internet.

“We observed earlier the KuduLite instance also ran SSH, so we used the same credentials on the KuduLite instance and were able to log in as root”.

The developers of the App Service KuduLite made sure admins were only able to log into it as a low privileged user, so this raised a few red flags.

“Since we now controlled the KuduLite box, we had complete control over the SCM web server. We could listen to a user’s HTTP requests to the SCM web page, add our own pages, and inject malicious Javascript into the user’s web page”.

“Initially, we attempted to steal the SCM user’s cookies from their requests to the server, however, we quickly found out there is an nginx intermediate that strips the cookies from the request before they arrive to KuduLite. Furthermore, the cookies had an HttpOnly attribute, which meant we weren’t able to steal them with Javascript on the client’s browser”.

These mitigations by Microsoft and their Microsoft Azure team were very effective in limiting this vulnerability’s potential damage.

Microsoft Azure: The second vulnerability

The second vulnerability resides in the KuduLite API of Microsoft Azure, which is very similar to Kudu’s API. The application node is able to send requests to the KuduLite API without requiring any access validation. This is especially problematic when considering a web app with an SSRF vulnerability.

An attacker who manages to forge a GET request may access the application node’s file system via the KuduLite VFS API:

pasted image 0 27
credit image: Intezer

This would enable an attacker to easily steal source code and other assets on the application node.

An attacker who manages to forge a POST request may achieve remote code execution on the application node via the command API:

pasted image 0 23
credit image: Intezer

By contrast, in Windows (where Kudu is used), packets sent from the application node to the manager node are dropped.

Finally, these two vulnerabilities can be chained together, since once an attacker achieves code execution with the second vulnerability—provided they have an SSRF vulnerability—they can exploit the first one.

Chapter closed?

Fortunately, Intezer reached out to Microsoft with our findings as part of the responsive disclosure process and the vulnerabilities were quickly acknowledged and fixed.

Weekly Updates For Our Loyal Readers!

Jim Koohyar Biniyaz October 11, 2020
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?