Jan. 12, 2023, midnight |

The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org

Google Cloud Compute Engine (GCE) was vulnerable to SSH key injection by abusing an SSH-in-browser feature to change username and password.
An attacker could send a specially-crafted link to a target user, and if the victim was logged into GCP and clicked the link,
the attacker's SSH username and password would be added to the target machine, thereby allowing the attacker to log into it.
This was possible because no random token or CSRF protection had been implemented for the …

abusing browser change cloud compute compute engine engine gcp google google cloud injection key link log machine password random send ssh target token username victim vulnerable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Program Associate, Cyber Risk

@ Kroll | Toronto, ONT, Canada

Cybersecurity Operations Engineer 2

@ Humana | Remote US

Vice President - Lead Security Engineer (SECS04)

@ JPMorgan Chase & Co. | Columbus, OH, United States

Security Specialist

@ BGIS | Markham, ON, Canada