Researcher Finds Unpatched API Vulnerability In Google Cloud

Security researcher David Schutz discovered an SSRF bug in an internal Jobs API Google Cloud project. The now-patched vulnerability would have allowed attackers to access sensitive resources but was found while Schutz was conducting research for Discovery Documents. This is now fixed.

Yariv Shivek, VP of Product, Neosec had this to say:

The exploitation of this SSRF vulnerability highlights the need for API traffic monitoring and behavioral analytics: Once an attacker obtains an access token (or an API key, or any other form of credentials) they can impersonate an authenticated party and operate as that party. Can you spot abnormal behavior carried out by authenticated parties? Do you even see it?

That’s a good question. Hopefully finding out the answer to that question doesn’t have any negative effects. As in someone who gets pwned.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: