Hillai Ben-Sasson Profile picture
Jul 17 6 tweets 2 min read Read on X
I hacked the @SAP AI platform by changing my UID to 1337.

…Yeah, really.

This led to admin permissions on several SAP systems, but also access to customers’ secrets and private AI files 👀

This is the story of #SAPwned 🧵⬇️ Image
SAP AI Core allowed me to run AI training procedures – but with heavy restrictions.

🚫 I couldn’t run as root
🚫 Interesting permissions were removed
🚫 Access to the internal network was blocked by an @IstioMesh firewall

So I wondered – how does this firewall actually work?
I started reading the traffic rules set by Istio.

All network traffic was redirected to the proxy.
Except… traffic by UID 1337? 🤨

Although I couldn’t be root, setting my UID to 1337 was still allowed. So that’s what I did.
Crazily enough… it worked! 🤯 Image
With unrestricted access to SAP’s internal network, I started searching for interesting internal services.

I quickly found a Grafana Loki server, several EFS file shares, and a Helm server.

They all had one thing in common – they were fully accessible without authentication 🫠
Using this access, I gained admin permissions to:

☸️ SAP AI Core’s K8s cluster
🐳 SAP’s container registries
🐸 SAP’s Artifactory server

Allowing attackers to access:

📄 Internal logs
📁 Private customer files
🔑 Customers’ cloud secrets
And more! Image
All issues have been reported to SAP and fixed.

To read the full story with all technical details, check out our @wiz_io 1337 h4x0r blog 👇👇👇
wiz.io/blog/sapwned-s…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Hillai Ben-Sasson

Hillai Ben-Sasson Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @hillai

Sep 18, 2023
We found a public AI repo on GitHub, exposing over 38TB of private files – including personal computer backups of @Microsoft employees 👨‍💻

How did it happen? 👀
A single misconfigured token in @Azure Storage is all it takes 🧵⬇️ Image
Microsoft’s AI research team published open-source training data using “SAS tokens” – sharable links granting access to Azure Storage data.

Only instead of limiting access to specific files, the token granted access to the ENTIRE account, including *18* storage containers 🤯 Image
Within these containers, our @wiz_io secret scan found:

*️⃣ Personal passwords for Microsoft services
🔑 Private keys
📄 Private source code and AI training data
💬 Over 30k internal @MicrosoftTeams messages Image
Read 6 tweets
Mar 29, 2023
I hacked into a @bing CMS that allowed me to alter search results and take over millions of @Office365 accounts.
How did I do it? Well, it all started with a simple click in @Azure… 👀
This is the story of #BingBang 🧵⬇️ Image
My research started when our Research Team at @wiz_io first noticed a strange configuration in Azure. A single checkbox is all that separates an app from becoming “multi-tenant” – which by default, allows ALL USERS to log in. Image
I found a Microsoft app configured like this, and… just logged in 🤷🏻‍♂️
My user was immediately granted access to this “Bing Trivia” page. Don’t let the name fool you – it controls much more than just trivia. In fact, as I came to find out, it can control ACTUAL SEARCH RESULTS 🤯 Image
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(