HomeCyber BalkansThere is a bug in GCP Composer that allows privilege escalation.

There is a bug in GCP Composer that allows privilege escalation.

Published on

spot_img

Recently, a vulnerability known as ConfusedComposer was uncovered in Google Cloud Platform’s (GCP) Cloud Composer service, potentially opening the door for attackers to escalate their privileges. This vulnerability allowed individuals with edit permissions in Cloud Composer to elevate their access to the default Cloud Build service account, which had extensive permissions across various GCP services like Cloud Storage and Artifact Registry. As a result, sensitive data and services were left vulnerable to exploitation. Named ConfusedComposer due to its resemblance to another privilege escalation issue, ConfusedFunction, affecting GCP’s Cloud Functions service, this flaw highlighted the interconnected nature of cloud services and the potential risks involved.

The vulnerability in question stemmed from Cloud Composer’s feature that enabled the installation of custom Python Package Index (PyPI) packages in environments. Attackers could exploit this by injecting malicious code through a specially crafted PyPI package update in a Cloud Composer environment. This could then allow them to execute arbitrary code within the Cloud Build instance, enabling them to take control of critical GCP services. The ramifications of such an attack could include unauthorized access to enterprise applications and data, service disruptions, or the deployment of persistent backdoors in cloud environments, emphasizing the severity of the issue.

Upon discovery, Google acted swiftly to mitigate the vulnerability by disallowing the default Cloud Build service account from installing PyPI packages. Instead, the environment’s service account is now utilized for such actions, reducing the risk of similar attacks. This update was implemented for Cloud Composer 2 environments and automatically applied to newer versions, enhancing the security posture of GCP’s cloud orchestration service. Users of Cloud Composer 3 were unaffected as they already utilized the environment’s service account, further bolstering the overall security of the platform.

The revelation of ConfusedComposer coincided with other significant cloud vulnerabilities, such as the Destructive Stored URL Parameter Injection vulnerability in Microsoft Azure. This particular vulnerability could have empowered privileged attackers to manipulate server configurations, potentially leading to data loss. Additionally, Datadog Security Labs identified a bug in Microsoft Entra ID, which allowed attackers to shield compromised accounts from administrative modifications or deactivation. These instances underscore the dynamic and intricate nature of cloud security risks, emphasizing the necessity for persistent monitoring and updates to safeguard cloud environments effectively.

In conclusion, the discovery of the ConfusedComposer vulnerability in Google Cloud Platform’s Cloud Composer service serves as a stark reminder of the ongoing challenges in maintaining robust cloud security. With the ever-evolving landscape of cyber threats, organizations must remain vigilant and proactive in addressing vulnerabilities to mitigate potential risks and safeguard their assets effectively.

Reference:

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...