Summary
A confused deputy vulnerability was identified in Example Cloud’s managed service that allowed cross-tenant data access. The vulnerability existed in the service’s control plane where tenant isolation was not properly enforced during service account operations.
Technical Details
The vulnerability stems from improper validation of tenant context when the managed service performs operations on behalf of users. When a service account executes privileged operations, the control plane failed to verify that the requesting tenant had authorization to access the target resources.
Root Cause
The service’s internal API accepted tenant identifiers from user-controlled input without validating that the authenticated session belonged to the specified tenant.
| |
Exploitation
An attacker with valid credentials to any tenant could:
- Authenticate to the service with their legitimate credentials
- Modify the tenant identifier in API requests
- Access resources belonging to arbitrary tenants
Affected Versions
| Product | Versions | Status |
|---|---|---|
| Example Cloud Service | < 2.4.1 | Fixed in 2.4.1 |
| Example Cloud Service | 2.3.x | Fixed in 2.3.8 |
| Example Cloud Service | 2.2.x | End of life - upgrade required |
Remediation
The vendor implemented proper tenant context validation at the API gateway level, ensuring that all requests are validated against the authenticated session’s tenant before processing.
Organizations using affected versions should:
- Update to the latest patched version immediately
- Review access logs for suspicious cross-tenant access patterns
- Rotate any potentially compromised credentials
Acknowledgments
This vulnerability was discovered and reported through coordinated disclosure with CERT/CC.