{"id":40329,"date":"2020-01-30T12:24:34","date_gmt":"2020-01-30T12:24:34","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=6003707268fe952e66ef7ffb13ca2505"},"modified":"2020-01-30T12:24:34","modified_gmt":"2020-01-30T12:24:34","slug":"check-point-spots-two-flaws-in-microsoft-azure","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/check-point-spots-two-flaws-in-microsoft-azure\/","title":{"rendered":"Check Point spots two flaws in Microsoft Azure"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/nicole-kobie\">Nicole Kobie<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">30 Jan, 2020<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>Check Point security researchers spotted flaws in <a href=\"https:\/\/www.cloudpro.co.uk\/it-infrastructure\/security\/8088\/uncrackable-passwords-introduced-to-microsoft-azure\">Microsoft Azure<\/a> that could have let hackers take control over the cloud servers.<\/p>\n<p>The work was part of a wider project looking at cloud infrastructure, dubbed &#8220;Attack the Cloud&#8221;, in which Check Point wants to &#8220;break the assumption that cloud infrastructures are secure&#8221;.<\/p>\n<p>With Microsoft Azure, the researchers spotted two flaws. The first was in Azure Stack, and could have let criminals take screenshots or see other sensitive information by taking advantage of a vulnerability in the &#8220;DataService&#8221; function, which didn&#8217;t require authentication.<\/p>\n<p>&#8220;This security flaw would enable a hacker to get sensitive information of any business that has its machine running on Azure,&#8221; the researchers said. &#8220;In order to execute the exploitation, a hacker would first gain access to the Azure Stack Portal, enabling that person to send unauthenticated HTTP requests that provide screenshots and information about tenants and infrastructure machines.&#8221;<\/p>\n<p>The second flaw was in the Azure App Service, where businesses provision and deploy apps and business processes, and could have allowed hackers to take control of a server.<\/p>\n<p>&#8220;The end result would be that a hacker could potentially take control over the entire Azure server, and consequently take control over all your business code,&#8221; the researchers said.<\/p>\n<p>The researchers could get into applications, see data and take over accounts by creating a free user in Azure Cloud and running malicious functions.<\/p>\n<p>&#8220;Exploiting this vulnerability in all of the plans could allow us to compromise Microsoft\u2019s App Service infrastructure,&#8221; the researchers explain. &#8220;However, exploiting it specifically on a Free\/Shared plan could also allow compromising other tenant apps, data, and account.&#8221;<\/p>\n<p>Check Point disclosed the findings to <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1234\">Microsoft in January<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1372\">June last year<\/a>, with patches for both issued at the end of 2019. The first flaw was awarded $5,000 from Microsoft&#8217;s bug bounty programme; the second earned $40,000.<\/p>\n<p>The researchers emphasised in a report on the second flaw that while the cloud is &#8220;considered safe&#8221;, it can still have vulnerabilities:\u00a0&#8220;The cloud is not a magical place.&#8221; <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Nicole Kobie<\/p>\n<p>        30 Jan, 2020    <\/p>\n<p>      Check Point security researchers spotted flaws in Microsoft Azure that could have let hackers take control over the cloud servers.<br \/>\nThe work was part of a wider project looking at cloud infrastru&#8230;<\/p>\n","protected":false},"author":414,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-40329","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/414"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=40329"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40329\/revisions"}],"predecessor-version":[{"id":40374,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40329\/revisions\/40374"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=40329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=40329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=40329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}