Skip to content

Commit

Permalink
Closes #245: Add GCP Bulletins (#246)
Browse files Browse the repository at this point in the history
* Closes #245: Add GCP Bulletins

* Update and rename gcp-dropped-cloudarmor-policy.yaml to gcp-2021-019.yaml

* Update and rename gcp-anthos-predictable-seed.yaml to gcp-2021-022.yaml

* Update and rename gcp-cloudsql-tempdb-privesc.yaml to gcp-2023-007.yaml

* Update and rename gcp-gke-autopilot-privesc.yaml to gcp-2022-009.yaml

* Delete vulnerabilities/gcp-2022-009.yaml

Duplicate of https://www.cloudvulndb.org/gke-autopilot-allowlist

* Update and rename gcp-gke-hyperthreading.yaml to gcp-2022-011.yaml

---------

Co-authored-by: Amitai Cohen <71866656+korniko98@users.noreply.github.com>
  • Loading branch information
ramimac and korniko98 committed Nov 2, 2023
1 parent a9eb585 commit 6b8cb0b
Show file tree
Hide file tree
Showing 4 changed files with 121 additions and 0 deletions.
30 changes: 30 additions & 0 deletions vulnerabilities/gcp-2021-019.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
title: Dropped active Google Cloud Armor security policy

Check failure on line 1 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`Google` is not a recognized word. (unrecognized-spelling)
slug: gcp-2021-019

Check failure on line 2 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`gcp` is not a recognized word. (unrecognized-spelling)
cves: null
affectedPlatforms:
- GCP

Check failure on line 5 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`GCP` is not a recognized word. (unrecognized-spelling)
affectedServices:
- Cloud Armor
image: https://images.unsplash.com/photo-1607217237228-a8b69908bad6?ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D&auto=format&fit=crop&w=3270&q=80

Check failure on line 8 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`GVuf` is not a recognized word. (unrecognized-spelling)

Check failure on line 8 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`ixid` is not a recognized word. (unrecognized-spelling)

Check failure on line 8 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`ixlib` is not a recognized word. (unrecognized-spelling)

Check failure on line 8 in vulnerabilities/gcp-2021-019.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`MHxwa` is not a recognized word. (unrecognized-spelling)
severity: Low
discoveredBy:
name: null
org: null
domain: null
twitter: null
disclosedAt: null
publishedAt: 2021/09/29
exploitabilityPeriod: null
knownITWExploitation: null
summary: |
There is a known issue where updating a BackendConfig resource
using the v1beta1 API removes an active Google Cloud Armor
security policy from its service. If you do not configure Google Cloud Armor
on your Ingress resources via the BackendConfig, then this issue does not affect your clusters.
manualRemediation: |
Dropped Cloud Armor security policies must be manually reattached.
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://cloud.google.com/support/bulletins#gcp-2021-019
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-019
30 changes: 30 additions & 0 deletions vulnerabilities/gcp-2021-022.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
title: Predictible seed in Anthos Identity Service LDAP module
slug: gcp-2021-022
cves: null
affectedPlatforms:
- GCP
affectedServices:
- Anthos
image: https://images.unsplash.com/photo-1458014854819-1a40aa70211c?auto=format&fit=crop&q=80&w=2070&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D
severity: Low
discoveredBy:
name: null
org: null
domain: null
twitter: null
disclosedAt: null
publishedAt: 2021/09/22
exploitabilityPeriod: Ongoing
knownITWExploitation: null
summary: |
A vulnerability was discovered in the Anthos Identity Service (AIS) LDAP module
of Anthos clusters on VMware versions 1.8 and 1.8.1 where a seed key used in generating
keys is predictable. With this vulnerability, an authenticated user could add arbitrary
claims and escalate privileges indefinitely.
manualRemediation: |
Upgrade your clusters to version 1.8.2.
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://cloud.google.com/support/bulletins#gcp-2021-022
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-022
30 changes: 30 additions & 0 deletions vulnerabilities/gcp-2022-011.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
title: GKE Sandbox side channel attack
slug: gcp-2022-011
cves: null
affectedPlatforms:
- GCP
affectedServices:
- GKE Sandbox
image: https://images.pexels.com/photos/5371573/pexels-photo-5371573.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=2
severity: Medium
discoveredBy:
name: null
org: null
domain: null
twitter: null
disclosedAt: null
publishedAt: 2022/03/22
exploitabilityPeriod: null
knownITWExploitation: null
summary: |
There was a misconfiguration with Simultaneous Multi-Threading (SMT),
also known as Hyper-threading, in GKE Sandbox images, causing nodes
to be potentially exposed to side channel attacks such as
Microarchitectural Data Sampling (MDS).
manualRemediation: |
Upgrade nodes to versions 1.22.6-gke.1500 and later or 1.23.3-gke.1100 and later.
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://cloud.google.com/support/bulletins#gcp-2022-011
- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-011
31 changes: 31 additions & 0 deletions vulnerabilities/gcp-2023-007.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
title: Privilege escalation in GCP Cloud SQL
slug: gcp-2023-007
cves: null
affectedPlatforms:
- GCP
affectedServices:
- Cloud SQL
image: https://images.unsplash.com/photo-1544383835-bda2bc66a55d?auto=format&fit=crop&q=80&w=2036&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D
severity: Medium
discoveredBy:
name: null
org: null
domain: null
twitter: null
disclosedAt: null
publishedAt: 2023/06/02
exploitabilityPeriod: null
knownITWExploitation: null
summary: |
A vulnerability was discovered in Cloud SQL for SQL Server
that allowed customer administrator accounts to create triggers
in the tempdb database and use those to gain sysadmin privileges in the instance.
The sysadmin privileges would give the attacker access to system databases
and partial access to the machine running that SQL Server instance.
manualRemediation: |
None required
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://cloud.google.com/support/bulletins#GCP-2023-007
- https://cloud.google.com/sql/docs/security-bulletins#gcp-2023-007

1 comment on commit 6b8cb0b

@github-actions
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@check-spelling-bot Report

🔴 Please review

See the 📜action log or 📝 job summary for details.

Unrecognized words (20)
bda
dpr
gcp
gke
google
GVuf
ixid
ixlib
LDAP
MHxwa
Microarchitectural
pexels
Predictible
ramimac
sysadmin
tempdb
tinysrgb
unsplash
VMware
YWdlf
To accept these unrecognized words as correct, you could run the following commands

... in a clone of the git@github.com:wiz-sec/open-cvdb.git repository
on the main branch (ℹ️ how do I use this?):

curl -s -S -L 'https://raw.githubusercontent.com/check-spelling/check-spelling/main/apply.pl' |
perl - 'https://github.com/wiz-sec/open-cvdb/actions/runs/6732143994/attempts/1'
Available 📚 dictionaries could cover words not in the 📘 dictionary
Dictionary Entries Covers Uniquely
cspell:npm/dict/npm.txt 302 1
cspell:django/dict/django.txt 393 1

Consider adding them (in .github/workflows/spelling.yml) for uses: check-spelling/check-spelling@main in its with:

      with:
        extra_dictionaries:
          cspell:npm/dict/npm.txt
          cspell:django/dict/django.txt

To stop checking additional dictionaries, add (in .github/workflows/spelling.yml) for uses: check-spelling/check-spelling@main in its with:

check_extra_dictionaries: ''
Errors (1)

See the 📜action log or 📝 job summary for details.

❌ Errors Count
❌ dictionary-not-found 3

See ❌ Event descriptions for more information.

If the flagged items are false positives

If items relate to a ...

  • binary file (or some other file you wouldn't want to check at all).

    Please add a file path to the excludes.txt file matching the containing file.

    File paths are Perl 5 Regular Expressions - you can test yours before committing to verify it will match your files.

    ^ refers to the file's path from the root of the repository, so ^README\.md$ would exclude README.md (on whichever branch you're using).

  • well-formed pattern.

    If you can write a pattern that would match it,
    try adding it to the patterns.txt file.

    Patterns are Perl 5 Regular Expressions - you can test yours before committing to verify it will match your lines.

    Note that patterns can't match multiline strings.

Please sign in to comment.