Skip to content

Xbox Live, Azure Functions, App Service, and Azure Cosmos DB services on Microsoft Azure are exposed to server-side request forgery threats.

In two of the four instances, researchers from Orca Security found no authentication was needed.

Vulnerabilities discovered in four Microsoft Azure services, potentially allowing for server-side...
Vulnerabilities discovered in four Microsoft Azure services, potentially allowing for server-side request manipulation

Xbox Live, Azure Functions, App Service, and Azure Cosmos DB services on Microsoft Azure are exposed to server-side request forgery threats.

In a recent report released on Tuesday, cybersecurity firm Orca Security announced the discovery of four instances of Server-Side Request Forgery (SSRF) vulnerabilities in Microsoft Azure services. These vulnerabilities, while not posing an immediate threat to sensitive information or Azure backend services, are considered a potential risk due to their ability to allow attackers to read or update internal resources on a server.

Microsoft has confirmed that it has remediated the vulnerabilities after being notified of the research. The vulnerable services include Azure API Management, Azure Functions, Azure Machine Learning, and Azure Digital Twins. In two instances, the vulnerabilities in Azure Functions and Azure Digital Twins did not require authentication, making them easier for potential attackers to exploit without an Azure account.

SSRF attacks can be dangerous as an attacker can abuse the functionality of a server to read or update internal resources. However, Microsoft has determined that these vulnerabilities do not allow potential attackers to retrieve tokens, move to another host, or enable remote code execution. Furthermore, the vulnerabilities could not be used to access metadata, connect to internal services, obtain cross-tenant access, or access unauthorized data.

Microsoft considers the vulnerabilities as low risk and has implemented additional input validation for the vulnerable URLs to further mitigate the risk. The company stated that these particular vulnerabilities are not a threat to sensitive information or Azure backend services.

The discovery of these vulnerabilities highlights the importance of understanding the risk calculus of technology stacks for corporate stakeholders. As the evolving role of Chief Information Security Officers (CISOs) involves helping corporate stakeholders understand the risk calculus of their technology stacks, it is crucial to stay vigilant and proactive in addressing potential vulnerabilities.

Interestingly, Orca researchers noted a previous SSRF vulnerability in Oracle Cloud Services. The cloud instance metadata service (IMDS), a service that provides detailed information on instances running in a cloud environment, is a common target in SSRF attacks. If an attacker can access the host's IMDS in a SSRF attack, they could access detailed information on instances, including hostname, security group, MAC address, and user data.

Despite the low risk associated with these vulnerabilities, it is essential for companies using Microsoft Azure cloud services to be aware of their existence. No customer action is needed for the four impacted Azure services as Microsoft has already remediated the vulnerabilities. However, staying informed about potential risks and understanding the measures taken to mitigate them can help companies maintain a secure technology stack.

Read also: