Published Tue, Sep 20th, 2022
Platforms
An issue in Azure Cloud Shell could have allowed an attacker to take over an Azure App Service domain and leverage it to inject and execute commands in other tenants' terminals if they navigated to the domain while logged into their account. Using this method, an attacker could query the Azure IMDS on other tenants' behalf and thereby obtain their access tokens.
Cloud Shell
None required.
No tracked CVEs
Contributed by https://github.com/mer-b
Entry Status
Finalized
Disclosure Date
Sat, Aug 20th, 2022
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
9.17
(PI:1.5/A1:22/A2:1.21/A7:0.9/A8:1.1)
Discovered by
Gafnit Amiga, Lightspin