Azure Functions Local Settings Detected

medium Web App Scanning Plugin ID 113139

Synopsis

Azure Functions Local Settings Detected

Description

Azure Functions is a public cloud service from Microsoft providing a serverless computing platform which supports various programming languages (C#, Python, JavaScript...).

Before deploying their functions to the cloud, developers often write and test their code in their local development environment. Azure development tools use settings and sometimes secrets variables stored in a file named `local.settings.json`, which, when exposed, can be used by an attacker to gain access to sensitive information.

Solution

Ensure that the `local.settings.json` file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.

See Also

https://azure.microsoft.com/en-us/services/functions/#overview

https://docs.microsoft.com/en-us/azure/azure-functions/functions-develop-local

Plugin Details

Severity: Medium

ID: 113139

Type: remote

Published: 2/15/2022

Updated: 2/15/2022

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information