Miggo Logo

CVE-2023-36414: Azure Identity SDK Remote Code Execution Vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.83329%
Published
10/10/2023
Updated
6/3/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Azure.Identitynuget< 1.10.21.10.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (CWE-77) indicates command injection in development-time credentials. Both AzureCliCredential and AzurePowerShellCredential execute external shell commands to obtain tokens. The patch in 1.10.2 likely addressed improper input sanitization in these credential types. The high confidence stems from: 1) RCE aligns with command injection in process-executing credentials, 2) The changelog's 'development time credentials' fix reference, and 3) These credentials' inherent risk profile when handling untrusted input in shell commands.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*zur* I**ntity S*K is vuln*r**l* to r*mot* *o** *x**ution.

Reasoning

T** vuln*r**ility (*W*-**) in*i**t*s *omm*n* inj**tion in **v*lopm*nt-tim* *r***nti*ls. *ot* `*zur**li*r***nti*l` *n* `*zur*Pow*rS**ll*r***nti*l` *x**ut* *xt*rn*l s**ll *omm*n*s to o*t*in tok*ns. T** p*t** in *.**.* lik*ly ***r*ss** improp*r input s*