Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Contribution] Extracting Managed Identity Credentials from Azure Function Apps #256

Open
korniko98 opened this issue Nov 26, 2023 · 0 comments
Labels
addition New security issue or vulnerability azure Issue related to an Azure service

Comments

@korniko98
Copy link
Collaborator

Summary (give a brief description of the issue)

The Linux containers in Azure Function Apps utilize an encrypted start up context file hosted in Azure Storage Accounts The Storage Account URL and the decryption key are stored in the container environmental variables and are available to anyone with the ability to execute commands in the container This startup context can be decrypted to expose sensitive data about the Function App, including the certificates for any attached Managed Identities, allowing an attacker to gain persistence as the Managed Identity. As of the November 11, 2023, this issue has been fully addressed by Microsoft.

References (provide links to blogposts, etc.)

https://www.netspi.com/blog/technical/cloud-penetration-testing/mistaken-identity-azure-function-apps/

@korniko98 korniko98 added addition New security issue or vulnerability azure Issue related to an Azure service labels Nov 26, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
addition New security issue or vulnerability azure Issue related to an Azure service
Projects
None yet
Development

No branches or pull requests

1 participant