writeups.xyz writeups.xyz / Cloud

Title Vulnerabilities Programs Authors
The Deputy Is Confused About AWS Security Hub
38TB of data accidentally exposed by Microsoft AI researchers
Hijacking Someone Else’s DCSync
SAMLjacking a poisoned tenant
What the Function: Decrypting Azure Function App Keys
No keys attached: Exploring GitHub-to-AWS keyless authentication flaws
Hijacking Cloud CI/CD Systems for Fun and Profit
Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attack
Absuing Amazon VPC CNI Plugin For Kubernetes
AWS CodeBuild + S3 == Privilege Escalation
Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges
How Abusing AWS CloudFormation Led to a Total Takeover of an AWS Environment
Gaps in Azure Service Fabric’s Security Call for User Vigilance
Spotted: How we discovered Privilege Escalation, missing CloudTrail data and a race condition in AWS Directory Service
GCP CloudSQL Vulnerability Leads to Internal Container Access and Data Exposure
Unintended Path to Exam Domination - AWS EC2 Meta-Data
Tampering with Conditional Access Policies Using Azure AD Graph API
From GitHub To Account Takeover: Misconfigured Actions Place GCP & AWS Accounts At Risk
When Good APIs Go Bad: Uncovering 3 Azure API Management Vulnerabilities
Exploiting misconfigured Google Cloud Service Accounts from GitHub Actions
Securing Databricks cluster init scripts
AWS Identity Center (formerly known as AWS SSO): A Guide to Privilege Escalation and Identity and Access Management
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts
#BrokenSesame: Accidental ‘write’ permissions to private registry allowed potential RCE to Alibaba Cloud Database Services
From listKeys to Glory: How We Achieved a Subscription Privilege Escalation and RCE by Abusing Azure Storage Account Keys