GerriScary: Hacking the Supply Chain of Popular Google Products (ChromiumOS, Chromium, Bazel, Dart & More)

GerriScary: Hacking the Supply Chain of Popular Google Products (ChromiumOS, Chromium, Bazel, Dart & More)

|
Tenable Cloud Research discovered a supply chain compromise vulnerability in Google's Gerrit code-collaboration platform which we dubbed GerriScary. GerriScary allowed unauthorized code submission to at least 18 Google projects including ChromiumOS (CVE-2025-1568), Chromium, Dart and Bazel, which are now remediated. Third-party organizations that use Gerrit may also be at risk ... Read More
ConfusedComposer: A Privilege Escalation Vulnerability Impacting GCP Composer

ConfusedComposer: A Privilege Escalation Vulnerability Impacting GCP Composer

|
Tenable Research discovered a privilege-escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ConfusedComposer. The vulnerability could have allowed an identity with permission (composer.environments.update) to edit a Cloud Composer environment to escalate privileges to the default Cloud Build service account. The default Cloud Build ... Read More
ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run

ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run

|
Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions but that have edit permissions on Google Cloud Run revisions. The vulnerability could have allowed such an identity to abuse its ... Read More
CloudImposer: Executing Code on Millions of Google Servers with a Single Malicious Package

CloudImposer: Executing Code on Millions of Google Servers with a Single Malicious Package

|
Tenable Research discovered a remote code execution (RCE) vulnerability in Google Cloud Platform (GCP) that is now fixed and that we dubbed CloudImposer. The vulnerability could have allowed an attacker to hijack an internal software dependency that Google pre-installs on each Google Cloud Composer pipeline-orchestration tool. Tenable Research also found ... Read More
When Good APIs Go Bad: Uncovering 3 Azure API Management Vulnerabilities

When Good APIs Go Bad: Uncovering 3 Azure API Management Vulnerabilities

| | azure
Learn how now-patched Azure API Management service vulnerabilities revealed by the Ermetic research team enabled malicious actions The post When Good APIs Go Bad: Uncovering 3 Azure API Management Vulnerabilities appeared first on Ermetic ... Read More
How Attackers Can Exploit GCP’s Multicloud Workload Solution

How Attackers Can Exploit GCP’s Multicloud Workload Solution

| | gcp
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations. The post How Attackers Can Exploit GCP’s Multicloud Workload Solution appeared first on Ermetic ... Read More
EmojiDeploy attack flow

EmojiDeploy: Smile! Your Azure web service just got RCE’d ._.

| | azure
Ermetic's research team discovered a remote code execution vulnerability affecting Azure cloud services and other cloud sovereigns including Function Apps, App Service and Logic Apps. The post EmojiDeploy: Smile! Your Azure web service just got RCE’d ._. appeared first on Ermetic ... Read More