Published Tue, Oct 11th, 2022


Service Fabric Explorer (SFX) is a tool for inspecting and managing Azure Service Fabric clusters. An attacker with existing access to a "Deployer" type user with CreateComposeDeployment permissions in a given cluster could create a malicious application with a specially-crafted name. This would lead to client-side template injection (CSTI) and storing a malicious XSS payload in a dashboard shared between users of the same cluster. If a victim user with administrative permissions logged into the compromised SFX dashboard and clicked on the aforementioned payload, the attacker could hijack their permissions to perform a cluster node reset, erasing all customized settings including passwords and security configurations. This would allow the attacker to create new passwords and thereby gain full administrator access of the cluster.

Affected Services

Azure Service Fabric Explorer (SFX)


Update Service Fabric Runtime to version 8.1.316 or above.

Tracked CVEs



Disclosure Date
Thu, Aug 11th, 2022
Exploitablity Period
Known ITW Exploitation
Detection Methods
Vulnerable versions of Service Fabric Explorer (SFXv1) have URLs in the following format: https://<your instance name>. /Explorer/old.html#/ (as opposed to index.html).
Piercing Index Rating
Discovered by
Lidor Ben Shitrit, Roee Sagi, Orca Security