HomeVulnerabilityMicrosoft fixes vital Azure CLI flaw that leaked credentials in logs

Microsoft fixes vital Azure CLI flaw that leaked credentials in logs

Microsoft has fastened a vital security vulnerability that would let attackers steal credentials from GitHub Actions or Azure DevOps logs created utilizing Azure CLI (brief for Azure command-line interface).

The vulnerability (tracked as CVE-2023-36052) was reported by Palo Alto security researcher Aviad Hahami, who discovered that profitable exploitation permits unauthenticated attackers to remotely entry plain textual content contents written by Azure CLI to Steady Integration and Steady Deployment (CI/CD) logs.

“An attacker that efficiently exploited this vulnerability may recuperate plaintext passwords and usernames from log recordsdata created by the affected CLI instructions and revealed by Azure DevOps and/or GitHub Actions,” Microsoft explains.

“Clients utilizing the affected CLI instructions should replace their Azure CLI model to 2.53.1 or above to be protected in opposition to the dangers of this vulnerability. This additionally applies to prospects with log recordsdata created by utilizing these instructions by way of Azure DevOps and/or GitHub Actions.”

Microsoft says that prospects who not too long ago used Azure CLI instructions have been notified by way of the Azure Portal. In an MSRC weblog publish revealed as we speak, Redmond suggested all prospects to replace to the most recent Azure CLI model (2.54).

See also  FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Community

They’re additionally really useful to undergo the next steps to forestall unintentional publicity of secrets and techniques inside CI/CD logs:

  1. Hold Azure CLI up to date to the most recent launch.
  2. Keep away from exposing Azure CLI output in logs and/or publicly accessible places: If growing a script that requires the output worth, filter out the property wanted for the script (overview Azure CLI data relating to output codecs and implement really useful steering for masking an surroundings variable).
  3. Rotate keys and secrets and techniques usually. As a basic greatest follow, prospects are inspired to usually rotate keys and secrets and techniques on a cadence that works greatest for his or her surroundings (steering on key and secret concerns in Azure is accessible right here).
  4. Overview the steering round secrets and techniques administration for Azure providers.
  5. Overview GitHub greatest practices for security hardening in GitHub Actions.
  6. Guarantee GitHub repositories are set to non-public except in any other case wanted to be public.
  7. Overview the steering for securing Azure Pipelines

Microsoft has carried out a brand new Azure CLI default configuration to bolster security measures, aiming to forestall unintentional disclosure of delicate data. The up to date setting now restricts the presentation of secrets and techniques within the output generated by replace instructions regarding providers throughout the App Service household, together with Internet Apps and Features.

See also  Important flaw in Shim bootloader impacts main Linux distros

Nonetheless, the brand new default will roll out to prospects who’ve up to date to the most recent Azure CLI model (2.53.1 and better), whereas prior variations (2.53.0 and beneath) are nonetheless susceptible to exploitation.

Moreover, the corporate has broadened credential redaction capabilities throughout GitHub Actions and Azure Pipelines to extend the variety of recognizable key patterns inside construct logs and obfuscate them. 

With the brand new redaction talents replace, Redmond says that Microsoft-issued keys can be detected earlier than being inadvertently leaked in publicly accessible logs.

“By avoiding echoing secrets and techniques, the brand new launch prevents leakage in CI pipeline logs, builders’ machines, and log aggregators,” Hahami mentioned.

“We advocate updating the Azure CLI variations utilized in CI runners and builders’ machines to 2.54, to ensure no secrets and techniques are printed to the logs.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular