all InfoSec news
Azure App Service on Azure Stack Hub privilege escalation
Feb. 14, 2023, midnight |
The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org
(an on-prem private cloud offering). To exploit this vulnerability, an attacker must have
access to the targeted worker role and the ability to deploy a malicious application within
the worker. The attack itself is carried out locally on the worker role where a malicious
application has been deployed. Exploiting this vulnerability could grant an attacker the
ability to access and modify content of a targeted application …
access app application app service attack azure cloud deploy escalation exploit locally malicious malicious application on-prem private private cloud privilege privilege escalation role service stack vulnerability worker
More from www.cloudvulndb.org / The Open Cloud Vulnerability & Security Issue Database
AWS Amplify IAM role publicly assumable exposure
1 month, 2 weeks ago |
www.cloudvulndb.org
AWS Glue database password leakage
1 month, 3 weeks ago |
www.cloudvulndb.org
Synapse Analytics privilege escalation via intelligent caching
2 months, 3 weeks ago |
www.cloudvulndb.org
Azure Site Recovery privilege escalation
3 months, 2 weeks ago |
www.cloudvulndb.org
Azure HDInsight privilege escalation and DoS vulnerabilities
3 months, 3 weeks ago |
www.cloudvulndb.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)