Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Researchers discover ConfusedFunction vulnerability in Google Cloud Platform
Global Security

Researchers discover ConfusedFunction vulnerability in Google Cloud Platform

AdminBy AdminJuly 25, 2024No Comments3 Mins Read
ConfusedFunction Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 25, 2024Information hallCloud Security / Vulnerability

ConfusedFunction vulnerability

Cybersecurity researchers have disclosed a privilege escalation vulnerability affecting the Google Cloud Platform cloud service that an attacker could use to gain unauthorized access to other services and sensitive data.

It is stable given a vulnerability called ConfusedFunction.

“An attacker can elevate their privileges to the default Cloud Build service account and gain access to many services, such as Cloud Build, the repository (including the source code of other features), the artifact registry, and the container registry,” the company said in a statement exposure management.

“This access allows for lateral movement and elevation of privileges in the victim’s project, access to unauthorized data, and even its update or deletion.”

Cloud features referred to into a serverless runtime environment that allows developers to create single-purpose functions that run in response to specific events in the cloud without having to manage a server or update infrastructure.

Cyber ​​security

The problem identified by Tenable is that the Cloud Build service account is created in the background and binds to the default Cloud Build instance when a cloud feature is created or updated.

This work account opens the door to potential malicious activity due to its excessive permissions, thereby allowing an attacker with access to create or update a cloud function to exploit this vulnerability and elevate their privileges to the work account.

This permission can then be abused to access other Google Cloud services that are also built with Cloud Function, including Cloud Storage, Artifact Registry, and Container Registry. In a hypothetical attack scenario, ConfusedFunction could be used to leak the Cloud Build service account token via a webhook.

ConfusedFunction vulnerability

After responsible disclosure, Google has updated default behavior so Cloud Build uses Standard Compute Engine service account to prevent misuse. However, it should be noted that these changes do not apply to existing instances.

“The ConfusedFunction vulnerability highlights problematic scenarios that can arise due to the complexity of the software and the interrelationships between services in a cloud provider’s services,” said Tenable researcher Liv Mattan.

“While the GCP fix reduced the severity of the problem for future deployments, it did not completely eliminate it. This is because cloud feature deployments still trigger the creation of the aforementioned GCP services. As a result, users still have to assign minimal but still relatively broad permissions for a Cloud Build service account as part of a feature rollout.”

The development comes after Outpost24 detailed a moderate cross-site scripting (XSS) flaw in the Oracle Integration Cloud Platform that could be used to inject malicious code into an application.

There was a flaw rooted in the handling of the “consumer_url” parameter it’s decided from Oracle in its Critical Patch Update (CPU) released earlier this month.

“New integration creation page found at https://.integration.ocp.oraclecloud.com/ic/integration/home/faces/link?page=integration&consumer_url=didn’t require any other parameters,” security researcher Philip Nyquist said.

ConfusedFunction vulnerability

“This meant that an attacker would only need to identify the instance ID of a particular integration platform in order to send a functional payload to any user of the platform. In this way, an attacker can bypass the requirement to know a specific integration ID, which is normally only available to logged in users.”

It also matches Assetnote discovery of three security vulnerabilities in the ServiceNow cloud computing platform (CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217) that can be chained to exploits to gain full database access and execute arbitrary code on context of the Now platform.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.