Published Wed, Sep 22nd, 2021
Platforms
Upon blocking a request, GCP Org policy constraints were logging the deny logs in Principal''s project and the blocking project. An attacker could use those logs to exfiltrate any data, by making request from a Principal they own from a defender project.
N/A
Review denied logs in the defender project, because it was also logged there.
No tracked CVEs
Contributed by https://github.com/0xdabbad00
Entry Status
Finalized
Disclosure Date
Mon, Oct 12th, 2020
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Jonathan Rault, TrustOnCloud