all InfoSec news
SSH key injection in Google Cloud Compute Engine
Jan. 12, 2023, midnight |
The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org
An attacker could send a specially-crafted link to a target user, and if the victim was logged into GCP and clicked the link,
the attacker's SSH username and password would be added to the target machine, thereby allowing the attacker to log into it.
This was possible because no random token or CSRF protection had been implemented for the …
abusing browser change cloud compute compute engine engine gcp google google cloud injection key link log machine password random send ssh target token username victim vulnerable
More from www.cloudvulndb.org / The Open Cloud Vulnerability & Security Issue Database
AWS Amplify IAM role publicly assumable exposure
3 days, 14 hours ago |
www.cloudvulndb.org
Azure HDInsight privilege escalation and DoS vulnerabilities
2 months, 1 week ago |
www.cloudvulndb.org
Azure Pipelines Agent poisoned pipeline execution
3 months, 4 weeks ago |
www.cloudvulndb.org
Amazon WorkSpaces Windows client credential logging
6 months, 1 week ago |
www.cloudvulndb.org
Power Platform Custom Code information disclosure
8 months, 2 weeks ago |
www.cloudvulndb.org
Azure Front Door client-side desync
9 months, 3 weeks ago |
www.cloudvulndb.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Program Associate, Cyber Risk
@ Kroll | Toronto, ONT, Canada
Cybersecurity Operations Engineer 2
@ Humana | Remote US
Vice President - Lead Security Engineer (SECS04)
@ JPMorgan Chase & Co. | Columbus, OH, United States
Security Specialist
@ BGIS | Markham, ON, Canada