Description

As per insiders, three new vulnerabilities have been discovered in the Microsoft Azure API Management service, two of which are SSRF (server-side request forgery) flaws and one of which is an unrestricted file upload functionality in the API Management developer interface that could be exploited to gain access to sensitive information and backend services. Azure API Management is a multi-cloud management platform that allows enterprises to safely expose APIs to external and internal customers. Threat actors reportedly can make requests from the service's CORS proxy and the hosting proxy to access internal Azure assets, cause denial of service, and get beyond web application firewalls by taking advantage of the SSRF vulnerability. Malicious files can be uploaded to Azure's hosted internal workload using the file upload path traversal flaw, and they even have the ability to run arbitrary code on the target computers. Furthermore, by exploiting these vulnerabilities, hackers can read internal Azure resources and execute unauthorised code, whereas the path traversal vulnerability in the developer site is caused by a lack of validation of the file type and path files provided. Since the flaws were discovered, Microsoft has patched them all.