• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
4 year old microsoft azure zero day exposes web app source code

4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code

You are here: Home / Latest Cyber Security Vulnerabilities / 4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code
December 23, 2021

The security vulnerability could expose passwords and accessibility tokens, along with blueprints for internal infrastructure and acquiring application vulnerabilities.

The Microsoft Azure App Assistance has a 4-year-previous vulnerability that could reveal the supply code of web applications published in PHP, Python, Ruby or Node, researchers claimed, that have been deployed making use of Regional Git.

The bug has practically absolutely been exploited in the wild as a zero-day, in accordance to an assessment from Wiz. The organization dubbed the vulnerability “NotLegit,” and said it has existed since September 2017.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The Azure Application Company (aka Azure Web Applications) is a cloud computing-primarily based system for hosting websites and web programs. Regional Git meanwhile enables developers to initiate a area Git repository in just the Azure Application Service container in purchase to deploy code straight to the server. Right after deployment, the application is available for anybody on the internet below the *.azurewebsites.net domain.

The issue occurs since when employing Community Git, the Git folder is also uploaded and publicly accessible on unpatched devices it is placed in the “/home/web-site/wwwroot” directory, which everyone could access.

This has serious ramifications from a security perspective, according to the firm.

“Besides the chance that the source contains strategies like passwords and entry tokens, leaked source code is normally used for further more innovative attacks like gathering intel on the R&D division, discovering the interior infrastructure, and getting software program vulnerabilities,” researchers famous in a putting up this 7 days. “Finding vulnerabilities in software package is considerably simpler when the source code is accessible.”

They included, “basically, all a destructive actor had to do was to fetch the ‘/.git’ listing from the target software, and retrieve its source code.”

Botched Mitigation

Microsoft did at first deploy a mitigation, in the form of adding a “web.config” file to the Git folder within just the community listing that limited community entry it turns out this is an incomplete resolve however.

“Only Microsoft’s IIS webserver handles web.config information,” in accordance to Wiz. “But [if] you use PHP, Ruby, Python or Node…these programming languages are deployed with different webservers (Apache, Nginx, Flask, etc.), which do not cope with web.config files, leaving them unimpacted by the mitigation and consequently fully vulnerable.”

Wiz documented the lingering bug to Microsoft in October and was awarded a $7,500 bounty for the discovery and the computing large deployed fixes in between the Dec. 7-15 via email to affected people.

Very likely Exploited in the Wild

Git folders are normally mistakenly uncovered via misconfiguration (not just vulnerabilities, as in this scenario), and as these kinds of, cybercriminals are on the lookout for them, scientists warned.

“An exposed Git folder is a prevalent security issue that consumers make without the need of even recognizing it,” they explained. “Malicious actors are repeatedly scanning the internet for uncovered Git folders from which they can collect strategies and intellectual assets.”

Wiz deployed a susceptible Azure Application Provider software and linked it to an unused area to see if there would be any exploitation.

“[We] waited patiently to see if anybody tried out to arrive at the Git information,” they stated. “Within 4 days of deploying, we were being not astonished to see many requests for the Git folder from not known actors….this exploitation system is particularly simple, common and is actively currently being exploited.”

The pursuing users should examine the likely risk, according to Wiz, and make guaranteed to update their techniques:

  • People who deployed code through FTP or Web Deploy or Bash/SSH which resulted in documents acquiring initialized in the web app before any git deployment
  • Buyers who enabled LocalGit on the web application
  • People who subsequent Git clone/thrust sequence to publish updates.

“Because the security issue was in an Azure service, cloud users were uncovered on a large scale, and without having them being aware of or obtaining any control in excess of it,” researchers observed.

Test out our free upcoming are living and on-desire on-line city halls – distinctive, dynamic discussions with cybersecurity specialists and the Threatpost neighborhood.


Some elements of this article are sourced from:
threatpost.com

Previous Post: «Cyber Security News Army Recruiter Cyber-Stalked by Wannabe Soldier
Next Post: Russian Hacker’s $1.7M Restitution Order Overturned Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.