Git Product home page Git Product logo

csp_security_mistakes's People

Contributors

0xdabbad00 avatar a10ns avatar christophetd avatar dlorenc avatar ds0440 avatar jon-trust avatar louisdurufle avatar ramimac avatar ryanjarv avatar yuvalavra avatar z0ph avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

csp_security_mistakes's Issues

App Service RCE / Sandbox Escape (CVE-2019-1372)

Azure App Service RCE / Sandbox Escape (CVE-2019-1372)

  • Summary: A Vulnerability in App Service could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox. This Vulnerability allowed cross-account access when using Free/Shared tier.
  • Platform: Azure
  • Severity: Critical
  • Date: Reported: June 27, 2019, Published: January 30, 2020
  • Discoverer: Ronen Shustin (@ronenshh)
  • Customer action: Azure Cloud - N/A, Azure Stack / Windows Azure Pack Web Sites V2 - Manual Update
  • References: https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/

Multiple Cloud Providers (Including Amazon AWS) Local Privilege Escalation

Additional security mistakes

Security September (which includes two issues already in the repo) had five entries, one of which was unexploitable.

  1. https://onecloudplease.com/blog/security-september-racing-against-cloudwatch-synthetics-canaries
  2. https://onecloudplease.com/blog/security-september-fun-with-fncidr
  3. Ian has also disclosed: https://onecloudplease.com/blog/s3-bucket-namesquatting
  4. GKE and EKS were vulnerable to the CAP_NET_RAW issues as well
  5. A 2012 security analysis of AMIs found

    we were also able to undeleted 8,996 files from an official image that was published by Amazon AWS itself.

  6. csv injection in cloudtrail disclosed by Rhino
  7. 2008 - AWS Sig V1 vulnerability

Modifiable IMDS route

Wanted to check if this makes sense to open a PR for. The issue was AWS originally allowed the 169.254.169.254 to be routed to other EC2 instances, allowing them to effectively act as the IMDS server for the VPC.

This allowed lateral movement across instances due to the fact during boot cloud-init will run user data as root from this IP without verifying whether the server is trusted or not.

Reference: https://github.com/RyanJarv/EC2FakeImds

From my understanding this is not possible anymore for any account that hasn’t used this feature in the past. I don’t believe AWS made any public comment on this however.

Azure Cloud Shell and Azure Container Instances Container Breakout

Azure: Container Breakout in Azure Cloud Shell and Azure Container Instances

  • Summary: Azure failed to restrict customers' containers on ACS and ACI from accessing services on the underlying node, allowing for container breakout via the Kubelet API which allowed anonymous access. The researcher could see other customers' containers running on neighboring Kubernetes nodes, but decided to stop and report to MSRC. Though cross-account access wasn't demonstrated, the high bounty (30,000$) indicates MSRC considered the issue to be severe. It should be noted that compromising another customer's Cloud Shell instance is an absolutely devastating attack resulting in a full takeover of the victim's Azure account.
  • Platform: Azure
  • Severity: High or Critical, up to you
  • Date: January 20, 2020
  • Discoverer: Chen Cohen
  • Customer action: N/A
  • References:

Feature request: Present issues with filtering and sorting

This repo is a good start at collecting this data, but ultimately it needs to be presented via a webapp that can provide filtering and sorting. Some people are primarily interested in specific CSPs (ex. #23), most recent issues (#6), most severe issues, and more. I think backing this data in github is beneficial for transparency, submitting PRs and issues, etc. but the presentation of this data needs to be improved.

Splitting the README by provider?

Would it make sense to split the main file into per-provider files? It's long enough now that if nothing else a hyperlinked table of contents would be a massive help...

Add Ben Reser's MWAA vuln

https://cloudsecurityforum.slack.com/archives/C6DN616HG/p1653611790045629

I found a security vulnerability in MWAA (Amazon Managed Workflows for Apache Airflow) that has been fixed so now I can talk about it. Specifically there are two API calls that the service uses to convert IAM credentials into tokens that can be used to login to airflow. The CreateCliToken and CreateWebLoginToken were logging the tokens to CloudTrail. The event used included the hostname for the airflow server, so everything required to login to the server was in the event.

Reported May 11th, fixed May 22.

tokens are only valid for 60 seconds and CloudTrail log delivery is not fast enough that they are valid by the time an AWS customer can see them.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.