Researchers Detail Azure SFX Flaw That Could’ve Allowed Attackers to Gain Admin Access

News

Cybersecurity researchers have shared more details about a now-patched security flaw in Azure Service Fabric Explorer (SFX) that could potentially enable an attacker to gain administrator privileges on the cluster.

The vulnerability, tracked as CVE-2022-35829, carries a CVSS severity rating of 6.2 and was addressed by Microsoft as part of its Patch Tuesday updates last week.

CyberSecurity

Orca Security, which discovered and reported the flaw to the tech giant on August 11, 2022, dubbed the vulnerability FabriXss (pronounced “fabrics”). It impacts Azure Fabric Explorer version 8.1.316 and prior.

SFX is described by Microsoft as an open-source tool for inspecting and managing Azure Service Fabric clusters, a distributed systems platform that’s used to build and deploy microservices-based cloud applications.

The vulnerability is rooted in the fact that a user with permissions to “Create Compose Application” through the SFX client can leverage the privileges to create a rogue app and abuse a stored cross-site scripting (XSS) flaw in the “Application name” field to slip the payload.

CyberSecurity

Armed with this exploit, an adversary can send the specially crafted input during the application creation step, eventually leading to its execution.

“This includes performing a Cluster Node reset, which erases all customized settings such as passwords and security configurations, allowing an attacker to create new passwords and gain full Administrator permissions,” Orca Security researchers Lidor Ben Shitrit and Roee Sagi said.

Products You May Like

Articles You May Like

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering
Pro-Russian Hacktivists Target South Korea as North Korea Joins Ukraine War
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10)
Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes

Leave a Reply

Your email address will not be published. Required fields are marked *