critical

Dropping a Shell in Google Cloud SQL

Published Tue, Aug 18th, 2020

Platforms

gcp

Summary

Researchers discovered vulnerabilities in Google Cloud SQL that allowed gaining unauthorized shell access to MySQL instances. By chaining SQL injection, parameter injection in mysqldump, and network spoofing, they were able to escape a Docker container and gain full access to the host VM running Cloud SQL.

Affected Services

Cloud SQL

Remediation

None required. Google patched the vulnerabilities.

Tracked CVEs

No tracked CVEs

References

Contributed by https://github.com/korniko98

Entry Status

Stub (AI-Generated)

Disclosure Date

-

Exploitability Period

-

Known ITW Exploitation

-

Detection Methods

Monitor for suspicious export operations and network activity on Cloud SQL instances. Review logs for anomalous mysqldump commands or container escapes.

Piercing Index Rating

-

Discovered by

Ezequiel Pereira and Wouter ter Maat