TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

GCP CloudSQL Vulnerability Leads to Internal Container Access and Data Exposure

200 点作者 ivmoreau将近 2 年前

11 条评论

jimmyl02将近 2 年前
I'm pretty impressed with the GCP response, both the fact that they identified the behavior and took the first step in reaching out.
评论 #36087399 未加载
评论 #36087459 未加载
jorams将近 2 年前
So this blog post is missing any information about what the actual vulnerabilities were. What was the "gap"? What was the misconfiguration? Also missing is whether access to the host VM exposes meaningful secrets. Does this actually risk customers' sensitive data?
评论 #36088592 未加载
评论 #36088885 未加载
lima将近 2 年前
Last time I checked, their hosted databases run in dedicated VMs, which is where the real security boundary is.<p>Getting access to the host OS won&#x27;t give you much other than some internal binaries and config.
评论 #36091020 未加载
tidbitruminator将近 2 年前
There is a probably a good reason why they didn&#x27;t elaborate on this:<p>&quot;Our research began when we identified a gap in GCP’s security layer that was created for SQL Server.&quot;<p>It would have been interesting to see how they identified that security gap.
评论 #36088118 未加载
breakingcups将近 2 年前
This article is lacking the actual interesting bit, which is <i>how</i> was the escalation achieved? Just reads like bragging instead of being informative.
jalk将近 2 年前
I don’t know why, but I was disappointed they didn’t disclose how much the reward was.
评论 #36087627 未加载
评论 #36087409 未加载
AtNightWeCode将近 2 年前
&quot;With access to the operating system, we managed to find some internal Google URLs related to the docker image repository. We could also access the internal repo which later was fixed and the access from non internal IPs was blocked.&quot;<p>Fascinating how sloppy some people are when they set up infrastructure even though this may be down to bad defaults.
mcstafford将近 2 年前
The vulnerability sounds like it&#x27;s inherent to SQL Server, and that cloud providers haven&#x27;t been successful in blocking the underlying problem due to its proprietary nature.<p>Presenting it as a Cloud SQL problem is disingenuous.
评论 #36089305 未加载
londons_explore将近 2 年前
Remember that MS SQL server isn&#x27;t Google code... Any vulnerabilities it may contain they might be powerless to fix.<p>Considering that, Google probably has an extensive monitoring system running in the VM, looking for things happening that shouldn&#x27;t happen... And they have probably also built a filtering infrastructure between the users and the SQL server so that if any vulnerability is found, they can at least filter attempts to exploit it while a fix is being made.
评论 #36087659 未加载
speedgoose将近 2 年前
Isn’t the blur effect too light on the screenshots? I may be possible to recompute the &#x2F;etc&#x2F;shadow file.
评论 #36091414 未加载
redwood将近 2 年前
Oh boy someone&#x27;s not going to have a fun long weekend
评论 #36087214 未加载
评论 #36087216 未加载
评论 #36087234 未加载