Hacking

Experts found SSRF flaws in four different Microsoft Azure services

SSRF vulnerabilities in four Microsoft Azure services could be exploited to gain unauthorized access to cloud resources.

Researchers at the security firm Orca discovered that four different Microsoft Azure services were vulnerable to server-side request forgery (SSRF) attacks. Threat actors could have exploited the flaws to gain unauthorized access to cloud resources.

Vulnerable services included Azure API Management, Azure Functions, Azure Machine Learning and Azure Digital Twins.

The researchers successfully exploited two vulnerabilities without requiring any authentication on the Azure Functions and Azure Digital Twins services. The attacks allowed the experts to send requests in the name of the server without even having an Azure account.

“The discovered Azure SSRF vulnerabilities allowed an attacker to scan local ports, find new services, endpoints, and files – providing valuable information on possibly vulnerable servers and services to exploit for initial entry and the location of potential information to target.” reads the analysis published by Orca.

The experts pointed out that SSRF vulnerabilities can allow attackers with access to the host’s IMDS (Cloud Instance Metadata Service), to retrieve detailed info on instances (i.e. hostname, security group, MAC address and user-data) and potentially retrieve tokens, perform lateral movement and execute arbitrary code.

Orca researchers did not manage to reach any IMDS endpoints due to various SSRF mitigations implemented by Microsoft.

Below is the list of flaws discovered by the researchers:

Affected ServiceSeverityUnauthenticatedDate reportedStatus
SSRF #1Azure Digital TwinsImportantYesOctober 8, 2022Fixed (October 17, 2022)
SSRF #2Azure Functions AppImportantYesNovember 12, 2022Fixed (December 9, 2022)
SSRF #3Azure API ManagementImportantNoNovember 12, 2022Fixed (November 16, 2022)
SSRF #4Azure Machine LearningLowNoDecember 2, 2022Fixed(December 20, 2022)
  • SSRF #1 – Unauthenticated SSRF Vulnerability on Azure Digital Twins Explorer allows any unauthenticated user to request any URL by abusing the server.
  • SSRF #2 – Unauthenticated SSRF Vulnerability on Azure Functions allows any unauthenticated user to request any URL abusing the server.
  • SSRF #3 – Authenticated SSRF Vulnerability on Azure API Management Service allows any authenticated user to request any URL abusing the server.
  • SSRF #4 – Authenticated SSRF Vulnerability on Azure Machine Learning Service allows any authenticated user to request any URL abusing the server.

Organizations can mitigate SSRF attacks by validating all input and ensuring that servers are configured to only allow necessary inbound and outbound traffic. The researchers recommend adopting the principle of least privilege (PoLP) and keeping their system up to date and avoiding misconfiguration.

“After flagging the vulnerabilities to Microsoft, they were swiftly mitigated.” concludes the report. “The most notable aspect of these discoveries is arguably the number of SSRF vulnerabilities we were able to find with only minimal effort (including another SSRF vulnerability we found last year in Oracle Cloud Services), indicating just how prevalent they are and the risk they pose in cloud environments.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Microsoft Azure services)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

24 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.