Emilien Socchi Profile picture
Passionate security researcher and professional #EntraID #Azure #GCP #Kubernetes | Sharing technical tips and ideas | Currently MIA
Jan 27 โ€ข 4 tweets โ€ข 1 min read
Do you have ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฝ๐—ฟ๐—ถ๐—ป๐—ฐ๐—ถ๐—ฝ๐—ฎ๐—น๐˜€ using "Policy.ReadWrite.
ConditionalAccess" in ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——? Then you might be vulnerable to your ๐—ฒ๐—ป๐˜๐—ถ๐—ฟ๐—ฒ ๐˜๐—ฒ๐—ป๐—ฎ๐—ป๐˜ being ๐—ฟ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ๐—ฑ ๐Ÿ˜ฌ

Here is why ๐Ÿงต๐Ÿ‘‡ ๐Ÿ”Ž ๐—•๐—ฎ๐—ฐ๐—ธ๐—ด๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ
"Policy.ReadWrite.ConditionalAccess" has full control over Conditional Access Policies (CAPs).

(2/4)graphpermissions.merill.net/permission/Polโ€ฆ
Nov 2, 2022 โ€ข 7 tweets โ€ข 7 min read
How a simple web-app assessment lead to complete #AzureAd tenant takeover ๐Ÿคฏ
๐Ÿงต ๐Ÿ‘‡
#Azure #AzureKubernetesService #aks #Kubernetes #KubernetesSecurity #k8s #bugbounty #bugbountytips #bugbountytip #DevSecOps 1. Poorly-designed file upload functionality lead to RCE
2. Turned out the app was running in a container managed by #AzureKubernetesService (#AKS)
3. #Container was mounting a service account with permissions to deploy #pods in the same namespace
Nov 1, 2022 โ€ข 6 tweets โ€ข 4 min read
Mounting a #Kubernetes service account to a pod with permissions to deploy other pods implies that if your app has RCE, a threat actor will be able to infect other Services in the cluster (yes, even if you use strict PSPs) #KubernetesSecurity #k8s #aks #gke #eks
#DevSecOps
๐Ÿงต ๐Ÿ‘‡ Background:
โ–ช๏ธŽ A Service in #k8s is an object that balances HTTP requests between pods belonging to that Service
โ–ช๏ธŽ A Service identifies its pods through a set of labels (e.g. "fancy-app: prod", "db: users", etc)