HomeVulnerabilityGCP Cloud Composer Bug Let Attackers Elevate Entry through Malicious PyPI Packages

GCP Cloud Composer Bug Let Attackers Elevate Entry through Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that might have enabled an attacker to raise their privileges within the Cloud Composer workflow orchestration service that is primarily based on Apache Airflow.

“This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their entry to the default Cloud Construct service account, which has high-level permissions throughout GCP providers like Cloud Construct itself, Cloud Storage, and Artifact Registry,” Liv Matan, senior security researcher at Tenable, mentioned in a report shared with The Hacker Information.

The shortcoming has been codenamed ConfusedComposer by the cybersecurity firm, describing it as a variant of ConfusedFunction, a privilege escalation vulnerability impacting GCP’s Cloud Capabilities service that an attacker may exploit to entry different providers and delicate knowledge in an unauthorized method.

The disclosure comes weeks after Tenable detailed one other privilege escalation vulnerability in GCP Cloud Run dubbed ImageRunner that might have allowed a malicious actor to entry container photos and even inject malicious code — creating cascading results.

Like ImageRunner, ConfusedComposer is one other instance of the Jenga idea, which causes security points to be inherited from one service to the opposite when cloud service suppliers construct new providers atop current ones.

Cybersecurity

The exploit hinges on the attacker having permission to edit a Cloud Composer atmosphere (i.e., composer.environments.replace), which might be exploited to inject a malicious Python Package deal Index (PyPI) bundle that is able to escalating privileges via Cloud Construct.

See also  New Analysis Reveals Spectre Vulnerability Persists in Newest AMD and Intel Processors

The assault is made potential as a consequence of the truth that Cloud Composer permits customers to put in customized PyPI packages of their environments, thereby enabling an adversary to execute arbitrary code inside the related Cloud Construct occasion by utilizing set up scripts inside their malicious bundle.

“ConfusedComposer is vital as a result of it exposes how behind-the-scenes interactions between cloud providers will be exploited via privilege escalation,” Matan defined. “On this case, an attacker solely wants permission to replace a Cloud Composer atmosphere to achieve entry to important GCP providers like Cloud Storage and Artifact Registry.”

Profitable exploitation of the flaw may allow an attacker to siphon delicate knowledge, disrupt providers, and deploy malicious code inside CI/CD pipelines. Moreover, it may pave the way in which for the deployment of backdoors that may grant persistent entry to compromised cloud environments.

Following accountable disclosure by Tenable, Google has addressed the vulnerability as of April 13, 2025, by eliminating the usage of the Cloud Construct service account to put in PyPI packages.

“The atmosphere’s service account can be used as an alternative,” Google mentioned in an announcement on January 15, 2025. “Present Cloud Composer 2 environments that beforehand used the default Cloud Construct service account will change to utilizing the atmosphere’s service account as an alternative.”

See also  CISOs rethink hiring to emphasise abilities over levels and expertise

“Cloud Composer 2 environments created in variations 2.10.2 and later have already got this modification. Cloud Composer 3 environments already use the atmosphere’s service account, and should not impacted by this modification.”

The disclosure comes as Varonis Menace Labs uncovered a vulnerability in Microsoft Azure that might have allowed a menace actor with privileged entry to an Azure SQL Server to change configurations in a fashion that causes knowledge loss upon admin motion. Microsoft has totally remediated the difficulty as of April 9, 2025, after it was made conscious of it on August 5, 2024.

The Damaging Saved URL Parameter Injection vulnerability, the corporate mentioned, stems from an absence of character limitation for server firewall guidelines created utilizing Transact-SQL (T-SQL).

“By manipulating the title of server-level firewall guidelines via T-SQL, a menace actor with privileged entry to an Azure SQL Server can inject an implant that, primarily based on particular consumer actions, deletes arbitrary Azure sources that the consumer has permissions for,” security researcher Coby Abrams mentioned.

“The impression of a menace actor exploiting this vulnerability might be large-scale knowledge loss within the affected Azure account.”

See also  Hottest promoting product on the darknet: Hacked GenAI accounts

It additionally comes as Datadog Safety Labs make clear a bug in Microsoft Entra ID restricted administrative models that might allow an attacker to stop chosen customers from being modified, deleted, or disabled, even by a International Administrator.

Cybersecurity

“A privileged attacker may have used this bug to guard an account beneath their management, stopping containment by any Entra ID administrator,” security researcher Katie Knowles mentioned. This included varied duties equivalent to resetting passwords, revoking consumer periods, deleting customers, and clearing consumer multi-factor authentication (MFA) strategies.

The problem has since been fastened by the Home windows maker as of February 22, 2025, following accountable disclosure on August 19, 2024.

In current weeks, menace actors have been discovered coaching their sights on web sites hosted on Amazon Internet Providers (AWS) Elastic Compute Cloud (EC2) situations by exploiting Server-Aspect Request Forgery (SSRF) vulnerabilities to extract metadata data.

“EC2 Occasion Metadata is a function supplied by AWS that enables an EC2 occasion to entry data wanted at runtime with no need to authenticate or make exterior API calls,” F5 Labs researcher Merlyn Albery-Speyer mentioned. “It will probably expose data equivalent to the general public or personal IP deal with, occasion ID, and IAM function credentials. A lot of that is delicate knowledge of curiosity to attackers.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular