InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Google fixes GCP Composer flaw that could lead to remote code execution
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Google fixes GCP Composer flaw that could lead to remote code execution
Technology

Google fixes GCP Composer flaw that could lead to remote code execution

September 16, 2024 4 Min Read
Share
Google Fixes GCP Composer Flaw
SHARE

A now-patched critical security flaw affecting Google Cloud Platform (GCP) Composer could have been exploited to enable remote code execution on cloud servers through a supply chain attack technique known as dependency confusion.

The vulnerability is codenamed Cloud Importer According to Tenable Research.

“This vulnerability could have allowed an attacker to hijack an internal software dependency that Google pre-installs into each Google Cloud Composer pipeline orchestration tool,” security researcher Liv Matan said in a report shared with The Hacker News.

First documented by security researcher Alex Birsan in February 2021, dependency confusion (also known as a substitution attack) refers to a type of software supply chain compromise in which a package manager is tricked into pulling a malicious package from a public repository instead of the intended file of the same name in an internal repository.

This allows threat actors to launch large-scale supply chain attacks by publishing counterfeit packages to public package repositories with the same name but higher version number as a package developed in-house by a company.

As a result, package managers unknowingly download malicious packages from public repositories instead of private ones, and replace existing package dependencies with the unauthorized packages.

The issue identified by Tenable is similar in that a malicious package could be uploaded to a Python Package Index (PyPI) repository under the name “google-cloud-datacatalog-lineage-producer-client” and pre-installed on all Composer instances with elevated privileges.

Although Cloud Composer expects the packages in question to be version pinned (i.e. version 0.1.0), Tenable has discovered that using the `–extra-index-url` argument during the `pip install` command can result in dependency confusion, as it prioritizes retrieving the package from a public registry.

See also  New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

With these permissions, an attacker could execute code, steal service account credentials, and move laterally to other GCP services within the victim’s environment.

Following responsible disclosure on January 18, 2024, Google fixed the issue in May 2024 by ensuring that packages could only be installed from private repositories, and also added the extra precaution of verifying package checksums to ensure package integrity and validate that they have not been tampered with.

The Python Packaging Authority (PyPA) has been aware of the risks posed by the “–extra-index-url” argument since at least March 2018, and is said to be urging users not to use PyPI if they need to pull internal packages.

“Packages are expected to be unique down to their name and version, so two wheels with the same package name and version are treated as indistinguishable by pip,” PyPA members noted at the time. “This is an intentional feature of package metadata and is unlikely to change.”

As part of the fix, Google is recommending that developers use the “–index-url” argument instead of the “–extra-index-url” argument, and that GCP customers use Artifact Registry virtual repositories if they require multiple repositories.

“The ‘–index-url’ argument mitigates the risk of dependency confusion attacks by only searching for packages in the registries defined as the value provided to that argument,” Matan said.

Share This Article
Twitter Copy Link
Previous Article JRPG Metroidvania "Fallen Tier" surpasses crowdfunding goal in 6 hours JRPG Metroidvania “Fallen Tier” surpasses crowdfunding goal in 6 hours
Next Article Do you know the three governments in the United States? Many people don't know, so civic education is being promoted. Do you know the three governments in the United States? Many people don’t know, so civic education is being promoted.
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

ScRansom Ransomware
Technology

CosmicBeetle partners with RansomHub to deploy custom ScRansom ransomware

8 Min Read
mm
Technology

Asynchronous LLM API calls in Python: A comprehensive guide

13 Min Read
Scientists engineer molecular-scale memory states to push the limits of conventional computing
Technology

Scientists engineer molecular-scale memory states to push the limits of conventional computing

6 Min Read
Iranian Cyber ​​Group OilRig Targets Iraqi Government with Advanced Malware Attack
Technology

Iranian Cyber ​​Group OilRig Targets Iraqi Government with Advanced Malware Attack

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?