Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Google Cloud Platform (GCP) Privilege Escalation Vulnerability in GCP Cloud Run

Medium

Synopsis

Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed. The vulnerability could have allowed an identity with edit permissions on a Google Cloud Run revision to abuse those to pull private Google Artifact Registry and Google Container Registry images in the same account without any registry permissions.

Solution

In response to this discovery, GCP now makes sure that the principal (user or service account) creating or updating a Cloud Run resource now needs explicit permission to access the container image(s). When using Artifact Registry, ensure the principal has the Artifact Registry Reader (roles/artifactregistry.reader) IAM role on the project or repository containing the container image(s) to deploy.

 

The breaking change was 100% rolled out to production on 28 January 2025. A Mandatory Service Announcement was sent to affected Project, Folder, and Organization owners during the last week of November 2024 and the Release Notes warned users of the breaking change coming in January 2025.

 

After this fix Cloud Run checks to confirm that the deployer has read access to the image.

Disclosure Timeline

October 19, 2024 - Tenable reported the finding to Google
October 19, 2024 - Google triages the report
October 23, 2024 - Google reproduced the report and assessing impact
October 24, 2024 - Google says it's working as intended
October 25, 2024 - Google investigates one more attack vector
November 6, 2024 - Google asks for clarification on the disclosure date
November 6, 2024 - Tenable provides clarification
November 6, 2024 - Google updates they work on a fix
November 14, 2024 - Google awards a bounty on the finding
November 15, 2024 - Google shares on a Mandatory Service Announcement (MSA) regarding a change of behavior that will be introduced in the patch
November 28, 2024 - Tenable asks for an additional attack path details
December 5, 2024 - Google can not share details about the internal investigation
December 23, 2024 - Tenable asks for updates on the report, no updates yet
January 9, 2025 - Google updates that the mitigation is partly launched and asks for a blog draft
January 26, 2025 - Tenable asks for updates on the report
January 29, 2025 - Google says that the fix for the report should be 100% deployed shortly and asks about the blog draft status
February 4, 2025 - Tenable informs Google of the end of the disclosure period and willing to extend the disclosure period by 2 additional weeks to allow a full fix, Google acknowledges
February 6, 2025 - Google sets the issue to fixed
February 9, 2025 - Tenable thanks Google for the updates and fix, and updates Google that they plan to issue an advisory and will share the draft soon
February 10, 2025 - Tenable asks Google for final details on the fix and solution deployed
February 13, 2025 - Google updates Tenable with the fix details
February 17, 2025 - Tenable shares the TRA draft with Google

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2025-04
Credit:
Liv Matan
Affected Products:
GCP Cloud Run
Risk Factor:
Medium

Advisory Timeline

February 18, 2025 - Initial release.