Orca Security researchers have released technical details about a now-patched FabriXss vulnerability, tracked as CVE-2022-35829 (CVSS 6.2), that impacts Azure Fabric Explorer.
An attacker can exploit the vulnerability to gain administrator privileges on the cluster. In order to exploit this flaw, an attacker needs to have CreateComposeDeployment permission.
Orca Security reported the flaw to Microsoft in August 2022 and the company addressed it with the release of October 2022 Patch Tuesday updates .
The vulnerability impacts Azure Fabric Explorer version 8.1.316 and prior.
The SFX open-source tool allows to manage Azure Service Fabric clusters.
The SFX tool provides a shared dashboard to many groups of users, such as customers and clients. The experts discovered that a user with a “Deployer” profile with a single permission to ‘Create new Applications’ can create a malicious application name and abuse the Administrator permissions to perform a broad range of malicious activities.
“SFX can “host” many kinds of users in a shared dashboard. For example, a Fabric Cluster that is maintained and controlled by an Administrator from Organization X, can also offer services to its clients from the same organization.” reads the post published by Orca Security. “We found that a Deployer type user with a single permission to ‘Create new Applications’ via the dashboard, can use this single permission to create a malicious application name and abuse the Administrator permissions to perform various calls and actions.”
The attacker can reset a Cluster Node erasing all customized settings, such as passwords and security configurations, and creating a new passwords and gain full Administrator permissions.
An attacker can trigger the XSS vulnerability by sending the specially crafted input during the application creation step.
The experts describe a step by step procedure to trigger the flaw along with a screen recording:
FabriXss Vulnerability – Orca Research Pod | Orca Security
Below is the Timeline for this vulnerability:
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, FabriXSS)
[adrotate banner=”5″]
[adrotate banner=”13″]
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…
On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint,…
New botnet HTTPBot is targeting China's gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS …
Meta plans to train AI on EU user data from May 27 without consent; privacy…
Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise…
Google released emergency security updates to fix a Chrome vulnerability that could lead to full…
This website uses cookies.