Home Cyber Security AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

0
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Credentials in Build Logs

New cybersecurity analysis has discovered that command-line interface (CLI) instruments from Amazon Internet Providers (AWS) and Google Cloud can expose delicate credentials in construct logs, posing important dangers to organizations.

The vulnerability has been codenamed LeakyCLI by cloud safety agency Orca.

“Some instructions on Azure CLI, AWS CLI, and Google Cloud CLI can expose delicate info within the type of surroundings variables, which might be collected by adversaries when printed by instruments corresponding to GitHub Actions,” safety researcher Roi Nisimi mentioned in a report shared with The Hacker Information.

Microsoft has since addressed the difficulty as a part of safety updates launched in November 2023, assigned it the CVE identifier CVE-2023-36052 (CVSS rating: 8.6).

Cybersecurity

The concept, in a nutshell, has to do with how the CLI instructions corresponding to may very well be used to point out (pre-)outlined surroundings variables and output to Steady Integration and Steady Deployment (CI/CD) logs. An inventory of such instructions spanning AWS and Google Cloud is under 0

  • aws lambda get-function-configuration
  • aws lambda get-function
  • aws lambda update-function-configuration
  • aws lambda update-function-code
  • aws lambda publish-version
  • gcloud capabilities deploy <func> –set-env-vars
  • gcloud capabilities deploy <func> –update-env-vars
  • gcloud capabilities deploy <func> –remove-env-vars

Orca mentioned it discovered a number of tasks on GitHub that inadvertently leaked entry tokens and different delicate knowledge through Github Actions, CircleCI, TravisCI, and Cloud Construct logs.

Credentials in Build Logs
Credentials in Build Logs

Not like Microsoft, nonetheless, each Amazon and Google think about this to be anticipated habits, requiring that organizations take steps to keep away from storing secrets and techniques in surroundings variables and as an alternative use a devoted secrets and techniques retailer service like AWS Secrets and techniques Supervisor or Google Cloud Secret Supervisor.

Cybersecurity

Google additionally recommends the usage of the “–no-user-output-enabled” choice to suppress the printing of command output to straightforward output and commonplace error within the terminal.

“If unhealthy actors get their fingers on these surroundings variables, this might probably result in view delicate info together with credentials, corresponding to passwords, person names, and keys, which may enable them to entry any sources that the repository homeowners can,” Nisimi mentioned.

“CLI instructions are by default assumed to be working in a safe surroundings, however coupled with CI/CD pipelines, they might pose a safety risk.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here