back to article Microsoft paid Tenable a bug bounty for an Azure flaw it says doesn't need a fix, just better documentation

A vulnerability — or just Azure working as intended, depending on who you ask — in Microsoft's cloud potentially allows miscreants to wave away firewall rules and access other people's private web resources. The issue, discovered by the research team at vulnerability assessment outfit Tenable, stems from Service Tags, which …

  1. Yorick Hunt Silver badge
    Facepalm

    "That's not a bug, it's a feature."

    1. Anonymous Coward
      Terminator

      "That's not a bug, it's a feature."

      Yorick Hunt: "That's not a bug, it's a feature."

      Abusing Service Tags to Bypass Azure Firewall Rules

      this functionality may open the door for a malicious actor to achieve an impact similar to that of a server-side request forgery (SSRF) vulnerability.

  2. Pascal Monett Silver badge

    "our cloud working by design"

    I've got a hunch you're going to be changing your design pretty soon . . .

    1. Zippy´s Sausage Factory

      Re: "our cloud working by design"

      I'd agree with that. I can imagine a lot of government and defence customers seeing this and getting rather upset about it.

  3. Mike007 Silver badge

    Am I understanding correctly that this boils down to "If you whitelist azure services for unauthenticated access to your servers, anyone using those azure services gets access"?

    If so that does seem like expected behaviour... I would be surprised if such requests came from tenant-specific source IPs.

    1. diodesign (Written by Reg staff) Silver badge

      Kinda

      It's more nuanced than that as I understand it.

      If you whitelist specific Azure services to allow them to access to your servers as you instruct, anyone using those Azure services also gets access.

      Tenable argues Azure should prevent tenants from sending requests to other tenants via these services; Microsoft says you should put in your own levels of authentication and filtering to prevent cross-tenant access.

      I believe in having competent IT staff who are aware of this, sure. I also personally believe in not handing footguns to IT staff.

      C.

    2. Roland6 Silver badge

      I suspect the problem is the binary granularity ie. There is no concept of whitelist within a tenancy, to those listed in my friend group, to the world.

  4. Barking mad

    "The bottom line, according to both vendors, is to implement multiple layers of security"

    Believing you need multiple layers of security is an admission that you don't trust the first N-1 layers.

    The fourth paragraph from the end says "Microsoft recommends adding authentication and authorization checks and not only relying on firewall rules".

    That's the sensible thing to do. It's called zero trust.

    1. druck Silver badge

      Re: "The bottom line, according to both vendors, is to implement multiple layers of security"

      I credit Microsoft not for inventing zero trust, but certainly inventing the need for zero trust solutions anywhere it is involved.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like