Microsoft Patches Serious Azure Cloud Security Flaws

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft Patches Serious Azure Cloud Security Flaws


Three vulnerabilities in the platforms API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals.



Microsoft has patched three vulnerabilities in its Azure cloud platform that could have allowed attackers to access sensitive info on a targeted service, deny access to the server, or scan the internal network to mount further attacks, researchers have found.
Researchers from the Ermetic Research Team discovered the flaws in the Azure API Management Service, which allows organizations to create, manage, secure, and monitor APIs across all of their environments, they revealed in a blog post published May 4.
The flaws — all rated high-risk — include two
Server-Side Request Forgery (SSRF)
vulnerabilities and a file upload path traversal on an internal Azure workload.
SSRF allows an attacker to send a crafted request from a vulnerable server to a targeted external or internal server or service, or even target it in a denial-of-service (DoS) attack. Abusing these flaws means an attacker can access sensitive data stored on the targeted server, overload targeted servers using DoS attacks, and scan the internal network and identify potential targets for further attacks.
The third flaw is one in which
Azure
does not validate the file type and path of uploaded files. Typically in the case of this type of flaw, authenticated users can traverse the path specified to upload malicious files to the developer portal server and possibly execute code on it using DLL hijacking, IISNode config swapping, or any other similar attack vectors, the researchers said.
Microsoft responded quickly to
Ermetics disclosure of the flaws
and has fully patched them, according to the researchers, and no further action is necessary for Azure customers.
Specifically, the Ermetic researchers discovered two separate SSRF flaws: one that affected the Azure API Management CORS Proxy and another that affected the Azure API Management Hosting Proxy.
They discovered the former on Dec. 21, 2022, and at first believed it was
the same flaw
that was first reported to Microsoft by another cloud security company on Nov. 12, and fixed a few days later on Nov. 16. However, the researchers later realized that the flaw they found actually bypasses that initial fix. Microsoft ultimately patched the vulnerability fully in January, the initial researchers reported later, according to Ermetic.
Together, the Azure SSRF flaws that researchers discovered affected central servers that masses of users and organizations depend on for day-to-day operations, says Liv Matan, cloud security researcher at Ermetic.
Using them, attackers could fake requests from these legitimate servers, access internal services that may contain sensitive information belonging to Azure customers, and even prevent the availability of the vulnerable servers, he says.
The path-traversal flaw found in Azure API Management Service allowed for an unrestricted file upload to the Azure developer portal server, the researchers said. The developer portals authenticated mode allowed someone to upload static files and images that would be shown on a developers dedicated portal, they said.
The flaw could have allowed attackers to take advantage of Microsofts self-hosted developer portal as well as weaponize the vulnerability against end users, Matan explains.
Additionally, the Azure-hosted developer portal contains customer information that would have been at risk if the vulnerability had fallen into the wrong hands, he says.
While API flaws like the ones Ermetic researchers discovered are uncommon, awareness of these types of vulnerabilities has grown in the past few years, Matan says.
Moreover, blind SSRFs — SSRF flaws that do not necessarily return any data but rather focus on performing unauthorized actions on the server’s backend — are fairly common, especially in cloud platforms that offer a wide range of services, he says.
Microsoft already had previously patched four SSRF flaws in four separate services of its Azure cloud platform, two of which could have allowed attackers to perform
a server-side request forgery (SSRF) attack
— and thus potentially execute remote code execution — even without authentication to a legitimate account.
In the end, vulnerabilities can be discovered in any cloud platform, at any time, Matan says.
Theres certainly been evidence of this, as — aside from SSRF flaws — researchers already have found a number of other flaws in Azure as well as other cloud platforms that could have threatened enterprise environments.
In one instance, Microsoft patched what researchers called
a dangerous flaw
in its Azure Service Fabric component that, if exploited, would have allowed an unauthenticated, malicious actor to execute code on a container hosted on the platform.
Because its difficult for an enterprise deploying a cloud to have control over or even be aware of a flaw on the underlying cloud-hosting infrastructure, its important for organizations to be vigilant in their own security practices so they are prepared if a flaw is eventually discovered or exploited, the researchers said.
In the case of avoiding compromising in the recently discovered Azure API Management, Matan recommends that organizations should practice proper input-validation hygiene and configure their servers to not follow redirects.
To avoid a compromise in these cases, organizations should validate all input received from untrusted sources, such as user inputs or HTTP requests, he says.
Other steps organizations can take to avoid compromise in these cases, Matan adds, include using a whitelist approach, implementing a strong firewall to restrict outgoing traffic from the application to only necessary services and ports, isolating data, and managing permissions on the server in cloud environments using IMDSv2.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft Patches Serious Azure Cloud Security Flaws