A simple bypass is to immediately assign the principal the same permissions at the top level management group, Tenant Root Group (tenant ID) rather than the Root scope ("/").
I still think this is an important feature.
A simple bypass is to immediately assign the principal the same permissions at the top level management group, Tenant Root Group (tenant ID) rather than the Root scope ("/").
I still think this is an important feature.
Released after the Changed-Files debacle
github.com/github/audit...
Released after the Changed-Files debacle
github.com/github/audit...
Will never know what random internal service account were assigned a hopefully not critical role.
Will never know what random internal service account were assigned a hopefully not critical role.
fwdcloudsec.org/conference/e...
fwdcloudsec.org/conference/n...
www.o3c.no/knowledge/to...
www.o3c.no/knowledge/to...
fwdcloudsec.org/conference/n...
fwdcloudsec.org/conference/n...
aws.amazon.com/solutions/im...
aws.amazon.com/solutions/im...
Unlike my initial instinct, this was not related to a Public or Unprotected bucket..
Looking further into the breach, published by the Chaos Computer Club (ccc.de) responsible for the disclosure it was discovered by..
Unlike my initial instinct, this was not related to a Public or Unprotected bucket..
Looking further into the breach, published by the Chaos Computer Club (ccc.de) responsible for the disclosure it was discovered by..
redcanary.com/blog/threat-...
redcanary.com/blog/threat-...
Take a look at my blog post about abusing Data Factory to steal secrets and tokens.
Thanks @karimscloud.bsky.social for the inspiration to look into this.
codyburkard.com/abusingselfh...
Take a look at my blog post about abusing Data Factory to steal secrets and tokens.
Thanks @karimscloud.bsky.social for the inspiration to look into this.
codyburkard.com/abusingselfh...