critical

Dropping a Shell in Google Cloud SQL

Published Tue, Aug 18th, 2020
Platforms

Summary

Researchers discovered vulnerabilities in Google Cloud SQL that allowed gaining unauthorized shell access to MySQL instances. By chaining SQL injection, parameter injection in mysqldump, and network spoofing, they were able to escape a Docker container and gain full access to the host VM running Cloud SQL.

Affected Services

Cloud SQL

Remediation

None required. Google patched the vulnerabilities.

Tracked CVEs

No tracked CVEs

References

Entry Status
Stub (AI-Generated)
Disclosure Date
-
Exploitablity Period
-
Known ITW Exploitation
-
Detection Methods
Monitor for suspicious export operations and network activity on Cloud SQL instances. Review logs for anomalous mysqldump commands or container escapes.
Piercing Index Rating
-
Discovered by
Ezequiel Pereira and Wouter ter Maat