Cyber Security News

Azure Database for PostgreSQL Let Attacker to Bypass Authentication and Gain Access

The cloud cybersecurity firm, Discovered a chain of critical vulnerabilities in the widely used Azure Database for PostgreSQL Flexible Server. This could result in unauthorized cross-account database access in a region.

The vulnerabilities were reported to Microsoft Security Response Center (MSRC) by under Coordinated Vulnerability Disclosure (CVD). The researchers call the exploit chain “ExtraReplica”, and the flaws affected the database replication feature.

Microsoft was informed about the vulnerabilities in January and implemented patches within 48 hours.

Critical Flaws Let Attackers to Bypass Authentication to Gain Acess

The attack connects to a case of privilege escalation in the Azure PostgreSQL engine to gain code execution and a cross-account authentication bypass using a forged certificate, allowing an attacker to create a database in the target’s Azure region and exfiltrate sensitive information.

An advisory published by Microsoft states, “By exploiting an elevated permissions bug in the Flexible Server authentication process for a replication user, a malicious user could leverage an improperly anchored regular expression to bypass authentication to gain access to other customers’ databases”. The successful exploitation of the critical flaws might have enabled an adversary to gain unauthorized read access to other customers’ PostgreSQL databases, effectively bypassing tenant isolation.

Microsoft Fixes the Vulnerability

Microsoft mentions that the fixes included: Blocking the copy program in Postgres to alleviate the reported Remote Code Execution in the Flexible Server PostgreSQL service and fixing the verbose Postgres error message that displayed the certificate name.

Impact of the Vulnerability

Microsoft says all Flexible Server Postgres servers deployed using the public access networking option were impacted by this security vulnerability. Customers using the private access networking option were not exposed to this vulnerability. The Single Server offering of Postgres was not impacted.

Also, no customer data was accessed using this vulnerability. Azure updated all Flexible Servers to fix this vulnerability.

Finally, no action is required by customers. To further minimize exposure, Microsoft recommends that customers enable private network access when setting up their Flexible Server instances.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three…

3 hours ago

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout…

5 hours ago

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique…

5 hours ago

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant…

6 hours ago

Beware of Fake Online Speedtest Application With Obfuscated JS Codes

A sophisticated malware campaign has emerged that leverages fake online speed test applications to deploy…

10 hours ago

Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors

Defy Security, a leading provider of cybersecurity solutions and services, today announced the appointment of…

12 hours ago