iTnews Asia
  • Home
  • News
  • Security

Azure bug allowed password theft, researcher says

Azure bug allowed password theft, researcher says

Tenable CEO critical of slow fix, transparency.

By Richard Chirgwin on Aug 7, 2023 1:26PM

A report from security researchers at Tenable has led Microsoft to patch a cross-tenant information disclosure bug in its Azure cloud services.

According to Tenable, the issue led to “limited, unauthorised access to cross-tenant applications and sensitive data (including, but not limited,to authentication secrets)”.

According to Tenable, Azure Function hosts, launched when a customer operates custom connections in Microsoft’s Power Platform, had insufficient access control.

If an attacker determined the hostname of an Azure Function associated with a custom connector, they could use the bug to to interact with that function without authentication.

From there, “an attacker could determine the hostnames for Azure Functions associated with other customers’ custom connectors, as they differed only by an integer.

That enabled an enumeration attack – stepping through numbers in a POST command to expose other users.

“As a result, it was possible to intercept OAuth client IDs and secrets, as well as other forms of authentication, when interacting with the unsecured Azure Function hosts,” Tenable said.

In its advisory, Microsoft said its investigation showed that only Tenable’s researcher had achieved “anomalous access” via the bug, which it has since patched.

However, rolling the patch out took some time.

Tenable said it first reported the bug on March 30, and Microsoft said it patched the bug for a “majority” of customers on June 7.

However, further testing by Tenable showed the fix was incomplete. Microsoft’s advisory said it continued to affect “a very small subset of custom code in a soft deleted state were still impacted.

“This soft deleted state exists to enable quick recovery in case of accidental deletion of custom connectors as a resiliency mechanism.”

Patching was completed by August 2, Microsoft said.

Tenable CEO angry

The process has brought an angry LinkedIn post from Tenable’s chairman and CEO, Amit Yoran, who complained about Microsoft’s lack of transparency and slow response to the issue.

“They took more than 90 days to implement a partial fix – and only for new applications loaded in the service,” Yoran wrote in the post.

At the time he wrote the post, Yoran expected the full fix delivered in August to take until September.

“Cloud providers have long espoused the shared responsibility model,” Yoran said. 

“That model is irretrievably broken if your cloud vendor doesn’t notify you of issues as they arise and apply fixes openly.”

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
azure microsoft security tenable

Related Articles

  • Are third-party blind spots the weakest link in enterprise cybersecurity chain?
  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
  • Beware the rise of ‘vishing’ as a cyber threat in APAC
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Philippine education ministry hit by data leak exposing 210,020 records

Philippine education ministry hit by data leak exposing 210,020 records

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.