SELL FASTER BUY SMARTER SEARCH SHOP ADVERTS


SCROll DOWN TO SEE FORM TO POST ..SCROll DOWN TO SEE FORM TO POST
++MAP OR ENTER BELOW

Newly Discovered “By-Design” Flaw in Microsoft Azure Could Expose Storage Accounts to Hackers

Apr 11, 2023Ravie LakshmananCloud Security / Data Security

Microsoft Azure

A “by-design flaw” uncovered in Microsoft Azure could be
exploited by attackers to gain access to storage accounts, move
laterally in the environment, and even execute remote code.

“It is possible to abuse and leverage Microsoft Storage Accounts
by manipulating Azure Functions to steal access-tokens of higher
privilege identities, move laterally, potentially access critical
business assets, and execute remote code (RCE),” Orca said in a new
report[1]
shared with The Hacker News.

The exploitation path that underpins this attack is a mechanism
called Shared Key authorization[2], which is enabled by
default on storage accounts.

According to Microsoft, Azure generates two 512-bit storage
account access keys when creating a storage account. These keys can
be used to authorize access to data via Shared Key authorization,
or via SAS tokens that are signed with the shared key.

“Storage account access keys provide full access to the
configuration of a storage account, as well as the data,” Microsoft
notes[3]
in its documentation. “Access to the shared key grants a user full
access to a storage account’s configuration and its data.”

The cloud security firm said these access tokens can be stolen
by manipulating Azure Functions, potentially enabling a threat
actor with access to an account with Storage Account Contributor role[4] to escalate privileges
and take over systems.

Specifically, should a managed identity[5]
be used to invoke the Function app, it could be abused to execute
any command. This, in turn, is made possible owing to the fact that
a dedicated storage account is created when deploying an Azure
Function app.

“Once an attacker locates the storage account of a Function app
that is assigned with a strong managed identity, it can run code on
its behalf and as a result acquire a subscription privilege
escalation (PE),” Orca researcher Roi Nisimi said.

UPCOMING WEBINAR

Learn to Secure the Identity Perimeter – Proven Strategies

Improve your business security with our upcoming expert-led
cybersecurity webinar: Explore Identity Perimeter strategies!

Don’t Miss Out – Save Your Seat![6]

In other words, by exfiltrating the access-token of the Azure
Function app’s assigned managed identity to a remote server, a
threat actor can elevate privileges, move laterally, access new
resources, and execute a reverse shell on virtual machines.

“By overriding function files in storage accounts, an attacker
can steal and exfiltrate a higher-privileged identity and use it to
move laterally, exploit and compromise victims’ most valuable crown
jewels,” Nisimi explained.

As mitigations, it’s recommended that organizations consider
disabling Azure Shared Key authorization and using Azure Active
Directory authentication instead. In a coordinated disclosure,
Microsoft said[7]
it “plans to update how Functions client tools work with storage
accounts.”

“This includes changes to better support scenarios using
identity. After identity-based connections for AzureWebJobsStorage
are generally available and the new experiences are validated,
identity will become the default mode for AzureWebJobsStorage,
which is intended to move away from shared key authorization,” the
tech giant further added.

The findings arrive weeks after Microsoft patched a misconfiguration issue[8]
impacting Azure Active Directory that made it possible to tamper
with Bing search results and a reflected XSS vulnerability[9] in Azure Service Fabric
Explorer (SFX) that could lead to unauthenticated remote code
execution.

Found this article interesting? Follow us on Twitter [10] and LinkedIn[11] to read more exclusive
content we post.

References

  1. ^
    report
    (orca.security)
  2. ^
    Shared
    Key authorization
    (learn.microsoft.com)
  3. ^
    notes
    (learn.microsoft.com)
  4. ^
    Storage
    Account Contributor role

    (learn.microsoft.com)
  5. ^
    managed
    identity
    (learn.microsoft.com)
  6. ^
    Don’t
    Miss Out – Save Your Seat!
    (thehacker.news)
  7. ^
    said
    (msrc.microsoft.com)
  8. ^
    misconfiguration issue
    (thehackernews.com)
  9. ^
    reflected XSS vulnerability
    (thehackernews.com)
  10. ^
    Twitter 
    (twitter.com)
  11. ^
    LinkedIn
    (www.linkedin.com)

Read more

.An African People Search Engine Business directory and Entertainment Portal . Powered by The Swordpress Blog and the folks @ ojoojoo.com and Dotifi Web hosting

Submit A Place
Help Us Review This SwordPress !
Get Mobile App Get Mobile App
Get Mobile App

Add a new location

Edit Location

Add up to 5 images to create a gallery for this location.

×