5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.8 Medium
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.0%
All Hail Batch clusters are affected. An attacker is able to:
For example, a user could create a Microsoft or Google account and then change their email to “[email protected]”. This Microsoft or Google account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is “example.org”.
In Google, this attack is partially mitigated because Google requires users to verify ownership of their Google account. However, a valid user is able to create multiple distinct Hail Batch accounts by creating multiple distinct Google accounts using email addresses of the form “[email protected]”.
In Microsoft, this attack requires Azure AD Administrator access to an Azure AD Tenant. The Azure AD Administrator is permitted to change the email address of an account to any other email address without verification. An attacker can create an Azure Tenant for free.
sub
from the OAuth2 response, and, in Google, Google does an email verification.A forthcoming change will prevent users from creating multiple accounts using Google’s +
email redirection.
None.
[1] Hail Batch must separately stop using emails and start using the OAuth2 sub
in Google. This is a known deficiency. In particular, if an email is re-used by the organization for a new user, the new user could access the old user’s Hail Batch account.
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.8 Medium
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.0%