open-cvdb icon indicating copy to clipboard operation
open-cvdb copied to clipboard

[Contribution] Azure OpenAI Control Plane Bypass for Deployment resource

Open tyson-trust opened this issue 11 months ago • 2 comments

title: Azure OpenAI Control Plane Bypass for Deployment resource slug: azure-openai-controlplanebypass-deployments cves: null affectedPlatforms:

  • Azure affectedServices:
  • OpenAI
  • Deployment resource image: https://raw.githubusercontent.com/wiz-sec/open-cvdb/main/images/[slug].jpg severity: Medium - CVSS, Low - Piercing piercingIndexVector: A3:1.05/A4:1/A5:1/A6:3/A7:1.1/A8:1.1 discoveredBy: name: Tyson Garrett org: TrustOnCloud domain: null twitter: null publishedAt: 2024/02/22 disclosedAt: 2023/10/24 exploitabilityPeriod: Ongoing knownITWExploitation: null summary: | A set of Azure OpenAI authoring API’s enables the use of the service instance endpoint as opposed to management.azure.com to create, update, delete, and list/read the Azure OpenAI Deployment resource. This allows for bypass of Azure Policy for Deny/Modify effects, Resource Locks and provides you the option to use access keys instead of your Entra ID identity to do so.

manualRemediation: | Do not use the Azure AI Developer built-in role and ensure any roles used for Microsoft.CognitiveServices namespace add the below operations to the NotDataActions section of any applicable Role Definitions.

Microsoft.CognitiveServices/accounts/OpenAI/deployments/read Microsoft.CognitiveServices/accounts/OpenAI/deployments/write Microsoft.CognitiveServices/accounts/OpenAI/deployments/delete

detectionMethods: null contributor: https://github.com/tyson-trust references:

  • https://trustoncloud.com/how-i-bypassed-the-control-plane-in-azure-openai/

tyson-trust avatar Mar 05 '24 21:03 tyson-trust