all InfoSec news
Cloud SQL privilege escalation
May 24, 2023, midnight |
The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org
to result in complete control of the database engine and access to the
host OS. An attacker could have listed and accessed files in the host OS,
including any secrets on the machine, as well as gaining access to service
agents. However, it is unclear from the report if this level of access could
have allowed lateral movement within the Cloud SQL service or grant cross-tenant
access to other …
access cloud cloud sql control database engine escalation files gcp host machine privilege privilege escalation result secrets service sql vulnerability
More from www.cloudvulndb.org / The Open Cloud Vulnerability & Security Issue Database
GraphNinja
1 week, 4 days ago |
www.cloudvulndb.org
AWS Amplify IAM role publicly assumable exposure
3 weeks, 4 days ago |
www.cloudvulndb.org
AWS Glue database password leakage
4 weeks, 1 day ago |
www.cloudvulndb.org
Azure Site Recovery privilege escalation
2 months, 3 weeks ago |
www.cloudvulndb.org
Azure Pipelines Agent poisoned pipeline execution
4 months, 2 weeks ago |
www.cloudvulndb.org
Jobs in InfoSec / Cybersecurity
Embedded VSOC Analyst
@ Sibylline Ltd | Australia, Australia
Cloud Security Platform Engineer
@ Google | London, UK; United Kingdom
Senior Associate Cybersecurity GRC - FedRAMP
@ Workday | USA, VA, McLean
Senior Incident Response Consultant, Mandiant, Google Cloud
@ Google | Mexico; Colombia
Cyber Software Engineering, Advisor
@ Peraton | Fort Gordon, GA, United States
Cloud Security Architect (Federal)
@ Moveworks | Remote, USA