c
March 29, 2023, 12:20 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by Ermetic. Written by Liv Matan. The EmojiDeploy vulnerability is achieved through CSRF (Cross-site request forgery) on the ubiquitous SCM service Kudu. By abusing the vulnerability, attackers can deploy malicious zip files containing a payload to the victim's Azure application.ImpactEmojiDeploy allows remote code execution and a full takeover of the targeted application:Running code and commands as the www userTheft or deletion of sensitive dataPhishing campaignsTakeove...

abusing application attackers azure code code execution cross-site cross-site request forgery csrf deletion emojideploy ermetic files forgery malicious payload rce remote code remote code execution request scm service takeover victim vulnerability web zip

More from cloudsecurityalliance.org / Cloud Security Alliance

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA