Microsoft recently patched a vulnerability that can allow an attacker to gain full administrator permissions on Azure Service Fabric clusters.
Azure Service Fabric is a distributed systems platform that makes it easy to package, deploy, and manage microservices and containers. Users can create Service Fabric clusters — these are the hardware resources where applications can be deployed — on premises or in the cloud. Service Fabric Explorer (SFX) is an open-source tool for inspecting and managing these clusters.
Researchers at cloud security company Orca discovered that SFX v1 is affected by a spoofing vulnerability. The issue, tracked as CVE-2022-35829 and named FabriXss by Orca, involves client-side template injection (CSTI) and stored cross-site scripting (XSS).
“We found that a Deployer type user with a single permission to ‘Create new Applications’ via the dashboard, can use this single permission to create a malicious application name and abuse the Administrator permissions to perform various calls and actions,” Orca explained in a blog post detailing FabriXss.
“This includes performing a Cluster Node reset, which erases all customized settings such as passwords and security configurations, allowing an attacker to create new passwords and gain full Administrator permissions,” it added.
The vulnerability was reported to Microsoft in August and it was fixed with the October 2022 Patch Tuesday updates. The tech giant has told customers that they are vulnerable to attacks if they are using the older version of the tool — vulnerable versions have a URL that ends in ‘old.html’.
Microsoft has assigned a ‘medium severity’ (important) rating to the flaw and pointed out that user interaction is required for exploitation. Microsoft does not expect to see this vulnerability being exploited in malicious attacks.
This is not the only Azure Service Fabric vulnerability patched by Microsoft this year. Researchers at Palo Alto Networks have discovered a flaw that could allow an attacker with access to an Azure Linux container to escalate privileges and take over the entire cluster.
Related: Microsoft Azure Vulnerability Allowed Code Execution, Data Theft
Related: Microsoft Informs Users of High-Severity Vulnerability in Azure AD
Related: Critical Vulnerabilities in Azure PostgreSQL Exposed User Databases
Related: Microsoft Resolves Padding Oracle Vulnerability in Azure Storage SDK

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
