Thursday, 4 September 2025
26.9 C
Singapore
29.8 C
Thailand
19.3 C
Indonesia
28.2 C
Philippines

Tenable uncovers remote code execution flaw in Oracle Cloud Code Editor

Tenable discovered an RCE flaw in Oracle Cloud Code Editor that allowed attackers to exploit Cloud Shell; the issue has since been fixed.

Tenable Research has identified a remote code execution (RCE) vulnerability in Oracle Cloud Infrastructure (OCI)’s Code Editor, which could have allowed attackers to take over user environments and execute commands without consent. Although the issue has since been resolved by Oracle, the vulnerability highlighted significant security implications for users working with Cloud Shell and other integrated OCI services.

The flaw allowed attackers to hijack a user’s Cloud Shell session with a single click, potentially enabling lateral movement across Oracle’s developer ecosystem. Because the Code Editor and Cloud Shell share the same file system, session context, and authentication layer, any malicious file uploaded through the editor could be executed in Cloud Shell, posing a major security risk.

Deep integration exposes wider attack surface

OCI’s Code Editor is a browser-based development tool closely tied to core developer services including Resource Manager, Functions, and Data Science. These services all run on the same Cloud Shell environment, meaning files uploaded via Code Editor are immediately accessible within Cloud Shell.

Tenable researchers discovered that the Code Editor’s file upload endpoint, unlike Cloud Shell’s, did not include safeguards against Cross-Site Request Forgery (CSRF). Without CSRF protection, attackers could craft a webpage that, when visited by a logged-in Oracle Cloud user, would silently upload a malicious file into their Cloud Shell environment. This upload could modify sensitive files such as .bashrc, enabling arbitrary code execution the next time Cloud Shell is launched.

The vulnerability relied on how the Code Editor’s router handled file uploads. It accepted multipart/form-data POST requests without requiring extra authentication beyond an existing session cookie. That cookie, set with a SameSite=None attribute, failed to prevent cross-site requests. As a result, a malicious website could submit an unauthorised request on the user’s behalf, uploading a file without their knowledge.

Tenable’s proof-of-concept attack used this method to insert a reverse shell payload into .bashrc. Once the victim opened Cloud Shell again, the shell executed the payload, giving attackers interactive access to the environment and allowing them to run commands or extract credentials. With access to the Oracle Cloud Identity and the OCI Command Line Interface, attackers could then access or manipulate additional services.

Broader risks to integrated services

The vulnerability’s impact extended beyond Cloud Shell. Because services such as Resource Manager, Functions, and Data Science also rely on the same shared environment, any tampered files could disrupt or compromise these services as well. An attacker could, for instance, inject malicious code into a function or alter deployment scripts in Resource Manager, escalating the scope of the attack significantly.

Tenable researchers emphasised that such deep integration between services—while improving user experience—also increases security risk. “Cloud services, especially with their deep integrations and shared environments, function similarly [to a Jenga tower],” said Liv Matan, Senior Security Researcher at Tenable. “If a hidden integration or shared environment introduces a weakness, those risks can cascade into dependent services.”

Oracle patches vulnerability with new CSRF protection

In response to the report, Oracle has introduced a mandatory CSRF protection header for the affected endpoint. All file uploads must now include a custom header, x-csrf-token, with a fixed value. This header prevents unauthorised cross-site requests because modern browsers do not allow JavaScript from external sites to add arbitrary headers to cross-origin requests.

The patch effectively blocks attempts to exploit the issue, and no further action is required from users. The vulnerability was disclosed responsibly and remediated by Oracle before public release.

Tenable’s findings highlight the need for thorough security evaluations across all layers of cloud services, especially when shared environments and integrated tools are involved. While Oracle has closed this specific vulnerability, the case serves as a broader reminder of the importance of securing cloud development environments.

Hot this week

Veeam launches first software appliance for instant, secure data protection

Veeam has launched its first hardware-agnostic software appliance, offering instant, secure data protection with built-in resilience.

Revolut expands Google Cloud partnership to reach 100 million customers

Revolut deepens its Google Cloud partnership to support global growth, innovation, and a customer base beyond 100 million users.

Shoppers face conflicting advice from ChatGPT and Google’s AI tools

A study reveals that ChatGPT and Google AI frequently disagree on brand recommendations, with notable differences in transparency and citation levels.

Huawei opens pre-registration for its second tri-fold smartphone in China

Huawei opens pre-registration for its Mate XTs tri-fold phone in China ahead of its 4 September launch, with multiple colours and storage options.

GovWare 2025 returns to mark 10 years with Singapore International Cyber Week

GovWare 2025 marks 10 years with Singapore International Cyber Week, focusing on AI-driven threats and global cybersecurity cooperation.

HubSpot unveils Loop Marketing playbook to drive growth in AI era

HubSpot launches Loop Marketing playbook and over 200 AI updates to help businesses grow in the era of AI search and zero-click results.

One in three Australian workers expose company data to AI platforms, Josys warns

Over a third of Australian workers upload sensitive data to AI tools, with Josys warning of rising risks from shadow AI and weak governance.

Singapore Polytechnic partners ESGpedia to strengthen sustainability efforts for local businesses

Singapore Polytechnic and ESGpedia partner to help Singapore businesses cut emissions, boost energy efficiency, and support the Green Plan 2030.

Veeam launches first software appliance for instant, secure data protection

Veeam has launched its first hardware-agnostic software appliance, offering instant, secure data protection with built-in resilience.

Related Articles

Popular Categories