Published Tue, Nov 14th, 2023
Platforms
Azure CLI commands were found to leak sensitive information, including credentials, through GitHub Actions logs. The vulnerability affects multiple Azure CLI commands and could expose secrets in public and private repositories. Microsoft has issued updates to Azure CLI, Azure Pipelines, and GitHub Actions to address the issue.
Azure CLI
Update Azure CLI to version 2.54 or later. Use Key Vault to store secrets. Avoid echoing sensitive output in CI/CD logs. Use JMESPath queries or redirect output when using Azure CLI commands.
CVE-2023-36052
Contributed by https://github.com/korniko98
Entry Status
Stub (AI-Generated)
Disclosure Date
Sat, Jul 1st, 2023
Exploitability Period
Until 2023/11/14
Known ITW Exploitation
-
Detection Methods
Review GitHub Actions and Azure Pipelines logs for exposed secrets or credentials. Scan repositories for Azure CLI commands that may output sensitive data. Monitor for unauthorized access attempts using exposed credentials.
Piercing Index Rating
-
Discovered by
Aviad Hahami, Palo Alto Networks Prisma Cloud