critical

AutoWarp

Published Mon, Mar 7th, 2022

Platforms

azure

Summary

An exposed endpoint in the Azure Automation Service allowed to steal Azure API credentials from other customers

Affected Services

Automation Service

Remediation

None required. As a general practice, use the least-privilege principle, including on managed identities assigned to automation accounts. While this would not have prevented the leakage of API credentials, it would have reduced the blast radius.

Tracked CVEs

No tracked CVEs

References

Contributed by https://github.com/christophetd

Entry Status

Finalized

Disclosure Date

Mon, Dec 6th, 2021

Exploitability Period

-

Known ITW Exploitation

-

Detection Methods

None

Piercing Index Rating

9.46

(PI:1.5/A1:20/A2:1.21/A7:1.1/A8:1.1)

Discovered by

Yanir Tsarimi, Orca Security