Published Mon, Mar 10th, 2025
Platforms
Azure API Connections were found to allow any reader on a subscription to access backend resources through a proxy endpoint, potentially exposing secrets from Key Vaults, databases, and third-party services. This vulnerability affects various Azure services and external APIs, enabling privilege escalation and unauthorized access to sensitive information.
Logic Apps, Key Vault, SQL Database, Jira, Salesforce, Storage Blobs, Defender ATP
None required. Microsoft has fixed the vulnerability by restricting access to the /extensions/proxy endpoint.
No tracked CVEs
Contributed by https://github.com/korniko98
Entry Status
Stub (AI-Generated)
Disclosure Date
Mon, Jan 6th, 2025
Exploitability Period
Until 2025/01/17
Known ITW Exploitation
-
Detection Methods
Monitor for unexpected or unauthorized access attempts to API Connections. Review Azure Activity Logs for suspicious queries to the management.azure.com endpoint, especially those targeting the /extensions/proxy path.
Piercing Index Rating
-
Discovered by
Haakon Holm Gulbrandsrud, Binary Security AS