Skip to content

Commit

Permalink
add new issues (#205)
Browse files Browse the repository at this point in the history
* Create power-platform-info-leak.yaml

* Create badbuild.yaml

* Add files via upload

* Update badbuild.yaml
  • Loading branch information
korniko98 authored Aug 6, 2023
1 parent 0189af5 commit 8f885b7
Show file tree
Hide file tree
Showing 4 changed files with 73 additions and 0 deletions.
Binary file added images/badbuild.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/power-platform-info-leak.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
35 changes: 35 additions & 0 deletions vulnerabilities/badbuild.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
title: Bad.Build
slug: badbuild

Check failure on line 2 in vulnerabilities/badbuild.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`badbuild` is not a recognized word. (unrecognized-spelling)
cves: null
affectedPlatforms:
- GCP
affectedServices:
- Cloud Build
image: https://raw.githubusercontent.com/wiz-sec/open-cvdb/main/images/badbuild.jpg

Check failure on line 8 in vulnerabilities/badbuild.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`badbuild` is not a recognized word. (unrecognized-spelling)
severity: Low
discoveredBy:
name: Roi Nisimi

Check failure on line 11 in vulnerabilities/badbuild.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`Nisimi` is not a recognized word. (unrecognized-spelling)
org: Orca Security
domain: orca.security
twitter: null
publishedAt: 2023/07/18
disclosedAt: null
exploitabilityPeriod: null
knownITWExploitation: false
summary: |
An information disclosure vulnerability in the Google Cloud Build service could have
allowed an attacker to view sensitive logs if they had gained prior access to a GCP
environment and had permission to create a new Cloud Build instance (cloudbuild.builds.create)

Check failure on line 22 in vulnerabilities/badbuild.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`cloudbuild` is not a recognized word. (unrecognized-spelling)
or permission to directly impersonate the Cloud Build default service account (which is highly
privileged by design and therefore considered to be a known privilege escalation vector in GCP).
An attacker could then potentially use this information in order to better facilitate lateral movement,
privilege escalation or a supply chain attack by other means. This issue was due to excessive
permissions granted to the default service account created by Cloud Build, particularly access to
audit logs containing all project permissions (logging.privateLogEntries.list).
manualRemediation: |
None required
detectionMethods: null
contributor: https://github.com/korniko98

Check failure on line 32 in vulnerabilities/badbuild.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`korniko` is not a recognized word. (unrecognized-spelling)
references:
- https://cloud.google.com/build/docs/security-bulletins#GCP-2023-013
- https://orca.security/resources/blog/bad-build-google-cloud-build-potential-supply-chain-attack-vulnerability/
38 changes: 38 additions & 0 deletions vulnerabilities/power-platform-info-leak.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
title: Power Platform Custom Code information disclosure
slug: power-platform-info-leak
cves: null
affectedPlatforms:
- Azure
affectedServices:
- Power Platform
image: https://raw.githubusercontent.com/wiz-sec/open-cvdb/main/images/power-platform-info-leak.jpg
severity: High
discoveredBy:
name: Evan Grant
org: Tenable
domain: tenable.com
twitter: null
publishedAt: 2023/08/04
disclosedAt: 2023/03/30
exploitabilityPeriod: null
knownITWExploitation: false
summary: |
A vulnerability in Power Platform could lead to unauthorized access to Custom
Code functions used for custom connectors, thereby allowing cross-tenant information
disclosure of secrets or other sensitive information if these were embedded in a
Custom Code function. The issue occurred as a result of insufficient access control
to Azure Function hosts, which are launched as part of the creation and operation of
custom connectors in Microsoft’s Power Platform. An attacker who determined the
hostname of the Azure Function associated with the custom connector could interact
with the function without authentication. Microsoft fixed the issue by requiring Azure
Function keys for accessing the Function hosts and their HTTP trigger. An initial fix
was deployed (on June 7th, 2023), but customers using affected Custom Code in a "soft
deleted state" (part of a data recovery mechanism) remained vulnerable until a later
fix was applied (on August 2nd, 2023).
manualRemediation: |
None required
detectionMethods: null
contributor: https://github.com/korniko98

Check failure on line 35 in vulnerabilities/power-platform-info-leak.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`korniko` is not a recognized word. (unrecognized-spelling)
references:
- https://msrc.microsoft.com/blog/2023/08/microsoft-mitigates-power-platform-custom-code-information-disclosure-vulnerability/
- https://www.tenable.com/security/research/tra-2023-25

4 comments on commit 8f885b7

@github-actions

This comment was marked as outdated.

@github-actions

This comment was marked as outdated.

@github-actions

This comment was marked as outdated.

@github-actions
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@check-spelling-bot Report

🔴 Please review

See the 📜action log for details.

Unrecognized words (420)
ACI
Acloudsec
acsessed
adfd
aec
aeeecba
airshow
alexbrasetvik
allowlist
Amitai
amitaico
analystics
appsecco
Arkadiy
arkadiyt
Arvanitis
assumerole
astrix
ASX
asxconsulting
atlassian
attachme
autowarp
Avrahami
awsblog
AWSEC
awsteele
Ayrey
azurecomcdn
azureedge
azurescape
azurewebsites
bacccdf
backdooring
backdoors
badbuild
Balduzzi
Balzarotti
bbf
bchatelard
BContribution
bdd
beem
benbridts
binarysecurity
blakedunson
blogpost
blogs
blogspot
bluebleed
bootup
Brancaleoni
Brancato
Brasetvik
breakingformation
Bridts
brokensesame
bugbountywriteup
bugra
bugraeskici
bugzilla
Bypassable
cdc
cded
cdn
cfae
cgroup
Champetier
champtar
changelog
chaosdb
Chatelard
Cheesepuffs
chencococococo
chown
chrihala
christophetd
cleartext
cloudar
cloudasset
cloudbuild
cloudformer
cloudshell
cloudsql
cloudsqladmin
cloudsqlsuperuser
CMK
cmu
codeartifact
cosmiss
creativecommons
cred
credmanifest
cvt
cxprocessserver
Cyber
danielleaminov
Datadog
datadoghq
Dataprep
Dataproc
datocms
daveysec
defe
dekel
Dereeper
descope
desync
developerguide
Diffend
Divyanshu
DLLs
dominguez
dpr
effc
Elad
eladgabay
Elnaggar
eltima
embracethered
Emilien
emiliensocchi
emoji
emojideploy
enum
epereiralopez
ermetic
Eskici
exfil
exfiltrated
exfiltrating
extrareplica
ezequiel
fabricscape
fdcf
fdw
fea
fel
ffd
filesharemount
firewalls
fncidr
Fosaaen
frichette
frichetten
Gabay
Gafnit
gafnitav
gce
gcp
Gerstenkorn
ghosttoken
GHSA
Gietz
Gietzen
gitlab
gke
globbing
GMoc
googleblog
Grzelak
GSD
Gulbrandsrud
guycoldham
gvisor
GVuf
Haroon
hashicorp
hellskeychain
hencohen
hostnames
hotpatch
hotpatches
Hudak
hyperlink
iamadmin
ianduffy
iann
iap
iframes
ignacio
imds
imdsv
inawisdom
inforce
intezer
iptables
irsl
itspeterc
ixid
ixlib
jnovak
jon
Joyneer
justm
justmorpheus
jwnovak
Karan
karims
kasif
kasifdekel
kattraxler
keychain
keycredential
Kirda
kloudle
korniko
koyeb
kubelet
kubernetes
Lbo
legitsecurity
leszekgrzegorek
Lidor
lightspin
louisdurufle
Loureiro
lpe
Luttwak
LXD
Magri
markus
Matan
mbrancato
meatballninja
Melhaoui
mgmt
mhgeay
MHxwa
mitm
Mnwx
monis
monoxgas
mwaa
MWR
mwrcybersec
Nadav
nechudav
nechuta
nen
Nir
nirohfeld
Nisimi
noauth
notlegit
NTLMv
nvd
NWD
NXYe
OCID
offensi
Ohfeld
olyympusv
OMI
omigod
onecloudplease
onug
opsmorph
Organisations
Osama
osamaelnaggar
oslogin
OWASP
Pahima
paloaltonetworks
passrole
passthehashbrwn
passwd
passwo
pastebin
patricksanders
pbs
pentesting
pexels
phishing
pixabay
PLCPCP
portswigger
Postgre
postgresql
privesc
Prizmant
pwnalytics
pwning
Qds
QEr
ramimac
Rault
RBAC
rced
redhat
redteam
Rehberger
reid
replicator
Reser
RHEL
rhinosecuritylabs
Riyaz
riyazwalikar
ronenshh
rph
runfunctions
runtimes
ryanjarv
sada
Sagi
Saini
sandboxing
Sasson
Schindel
Schmieg
scm
SDKs
secjuice
seclab
securityfu
securitylabs
sentinelone
sfa
shirtamari
Shitrit
Shukla
Shustin
sigs
sigv
Siteyou
Sivanesh
sivaneshashok
Slaviero
smqmo
Socchi
socradar
Spen
spiske
sqlserver
srgb
ssrf
starbucks
stazot
Sudo
sudoers
summitroute
superglue
suse
svgrepo
symlink
synfs
synlapse
sysadmin
Tafani
techblog
techbrunch
tenchisecurity
Tetelman
thaidn
thefaultinourstars
theregister
thexplorer
threatmanagement
threatmodel
tinysrgb
TQmy
Traxler
trustoncloud
Tsarimi
twimg
Tzadik
Tzah
unauditable
unauditible
undelete
unencoded
unsplash
upguard
usb
usergroupspoofing
userguide
usernames
VCNx
VDB
vectra
vgp
visualstudio
VMs
vnhacker
vomqb
vrp
vssps
vulnerablities
vulns
wafs
Walikar
walkthrough
wallpaperflare
webcams
webpage
webshell
websites
wfw
willdeane
workaround
Wouter
wtm
WYAI
xdabbad
xpatrik
xutaf
xwgw
Yanir
Yesland
YJBJPK
ymedialabs
Yuval
yuvalavra
YWdlf
Zaddach
zego
zipdeploy
ZXRw
To accept ✔️ these unrecognized words as correct and remove the previously acknowledged and now absent words, run the following commands

... in a clone of the git@github.com:wiz-sec/open-cvdb.git repository
on the add-images-for-new-vulns branch (ℹ️ how do I use this?):

curl -s -S -L 'https://raw.githubusercontent.com/check-spelling/check-spelling/main/apply.pl' |
perl - 'https://github.com/wiz-sec/open-cvdb/actions/runs/5793676748/attempts/1'
Available 📚 dictionaries could cover words not in the 📘 dictionary
Dictionary Entries Covers
cspell:cpp/src/cpp.txt 30216 27
cspell:software-terms/src/software-terms.txt 1237 12
cspell:php/php.txt 2597 7
cspell:typescript/typescript.txt 1211 5
cspell:node/node.txt 1768 5

Consider adding them using (in .github/workflows/spelling.yml):

      with:
        extra_dictionaries:
          cspell:cpp/src/cpp.txt
          cspell:software-terms/src/software-terms.txt
          cspell:php/php.txt
          cspell:typescript/typescript.txt
          cspell:node/node.txt

To stop checking additional dictionaries, add:

      with:
        check_extra_dictionaries: ''
Errors (1)

See the 📜action log for details.

❌ Errors Count
❌ forbidden-pattern 3

See ❌ Event descriptions for more information.

If the flagged items are false positives

If items relate to a ...

  • binary file (or some other file you wouldn't want to check at all).

    Please add a file path to the excludes.txt file matching the containing file.

    File paths are Perl 5 Regular Expressions - you can test yours before committing to verify it will match your files.

    ^ refers to the file's path from the root of the repository, so ^README\.md$ would exclude README.md (on whichever branch you're using).

  • well-formed pattern.

    If you can write a pattern that would match it,
    try adding it to the patterns.txt file.

    Patterns are Perl 5 Regular Expressions - you can test yours before committing to verify it will match your lines.

    Note that patterns can't match multiline strings.

Please sign in to comment.