HomeCyber SecurityGCP Cloud Composer Bug Let Attackers Elevate Entry by way of Malicious...

GCP Cloud Composer Bug Let Attackers Elevate Entry by way of Malicious PyPI Packages


GCP Cloud Composer Bug Let Attackers Elevate Entry by way of Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that might have enabled an attacker to raise their privileges within the Cloud Composer workflow orchestration service that is based mostly on Apache Airflow.

“This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their entry to the default Cloud Construct service account, which has high-level permissions throughout GCP providers like Cloud Construct itself, Cloud Storage, and Artifact Registry,” Liv Matan, senior safety researcher at Tenable, stated in a report shared with The Hacker Information.

The shortcoming has been codenamed ConfusedComposer by the cybersecurity firm, describing it as a variant of ConfusedFunction, a privilege escalation vulnerability impacting GCP’s Cloud Features service that an attacker may exploit to entry different providers and delicate information in an unauthorized method.

The disclosure comes weeks after Tenable detailed one other privilege escalation vulnerability in GCP Cloud Run dubbed ImageRunner that might have allowed a malicious actor to entry container pictures and even inject malicious code — creating cascading results.

Like ImageRunner, ConfusedComposer is one other instance of the Jenga idea, which causes safety points to be inherited from one service to the opposite when cloud service suppliers construct new providers atop current ones.

Cybersecurity

The exploit hinges on the attacker having permission to edit a Cloud Composer surroundings (i.e., composer.environments.replace), which may very well be exploited to inject a malicious Python Bundle Index (PyPI) package deal that is able to escalating privileges by Cloud Construct.

The assault is made potential on account of the truth that Cloud Composer permits customers to put in customized PyPI packages of their environments, thereby enabling an adversary to execute arbitrary code throughout the related Cloud Construct occasion by utilizing set up scripts inside their malicious package deal.

“ConfusedComposer is essential as a result of it exposes how behind-the-scenes interactions between cloud providers could be exploited by privilege escalation,” Matan defined. “On this case, an attacker solely wants permission to replace a Cloud Composer surroundings to realize entry to vital GCP providers like Cloud Storage and Artifact Registry.”

Profitable exploitation of the flaw may allow an attacker to siphon delicate information, disrupt providers, and deploy malicious code inside CI/CD pipelines. Moreover, it may pave the best way for the deployment of backdoors that may grant persistent entry to compromised cloud environments.

Following accountable disclosure by Tenable, Google has addressed the vulnerability as of April 13, 2025, by eliminating the usage of the Cloud Construct service account to put in PyPI packages.

“The surroundings’s service account shall be used as an alternative,” Google stated in an announcement on January 15, 2025. “Present Cloud Composer 2 environments that beforehand used the default Cloud Construct service account will change to utilizing the surroundings’s service account as an alternative.”

“Cloud Composer 2 environments created in variations 2.10.2 and later have already got this modification. Cloud Composer 3 environments already use the surroundings’s service account, and aren’t impacted by this modification.”

The disclosure comes as Varonis Risk Labs uncovered a vulnerability in Microsoft Azure that might have allowed a risk actor with privileged entry to an Azure SQL Server to change configurations in a fashion that causes information loss upon admin motion. Microsoft has absolutely remediated the difficulty as of April 9, 2025, after it was made conscious of it on August 5, 2024.

The Damaging Saved URL Parameter Injection vulnerability, the corporate stated, stems from a scarcity of character limitation for server firewall guidelines created utilizing Transact-SQL (T-SQL).

“By manipulating the title of server-level firewall guidelines by T-SQL, a risk actor with privileged entry to an Azure SQL Server can inject an implant that, based mostly on particular consumer actions, deletes arbitrary Azure assets that the consumer has permissions for,” safety researcher Coby Abrams stated.

“The impression of a risk actor exploiting this vulnerability may very well be large-scale information loss within the affected Azure account.”

It additionally comes as Datadog Safety Labs make clear a bug in Microsoft Entra ID restricted administrative items that might allow an attacker to forestall chosen customers from being modified, deleted, or disabled, even by a International Administrator.

Cybersecurity

“A privileged attacker may have used this bug to guard an account underneath their management, stopping containment by any Entra ID administrator,” safety researcher Katie Knowles stated. This included varied duties reminiscent of resetting passwords, revoking consumer periods, deleting customers, and clearing consumer multi-factor authentication (MFA) strategies.

The problem has since been fastened by the Home windows maker as of February 22, 2025, following accountable disclosure on August 19, 2024.

In latest weeks, risk actors have been discovered coaching their sights on web sites hosted on Amazon Net Providers (AWS) Elastic Compute Cloud (EC2) cases by exploiting Server-Facet Request Forgery (SSRF) vulnerabilities to extract metadata data.

“EC2 Occasion Metadata is a function supplied by AWS that enables an EC2 occasion to entry data wanted at runtime with no need to authenticate or make exterior API calls,” F5 Labs researcher Merlyn Albery-Speyer stated. “It may possibly expose data reminiscent of the general public or personal IP tackle, occasion ID, and IAM function credentials. A lot of that is delicate information of curiosity to attackers.”

Discovered this text attention-grabbing? Observe us on Twitter ï‚™ and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments