Headline
Azure App Service Linux source repository exposure
MSRC was informed by Wiz.io, a cloud security vendor, under Coordinated Vulnerability Disclosure (CVD) of an issue where customers can unintentionally configure the .git folder to be created in the content root, which would put them at risk for information disclosure. This, when combined with an application configured to serve static content, makes it possible for others to download files not intended to be public.
MSRC was informed by Wiz.io, a cloud security vendor, under Coordinated Vulnerability Disclosure (CVD) of an issue where customers can unintentionally configure the .git folder to be created in the content root, which would put them at risk for information disclosure. This, when combined with an application configured to serve static content, makes it possible for others to download files not intended to be public. We have notified the limited subset of customers that we believe are at risk due to this and we will continue to work with our customers on securing their applications.
Customer Impact Customer Impact
App Service Linux customers who deployed applications using Local Git after files were created or modified in the content root directory are impacted. This happens because the system attempts to preserve the currently deployed files as part of repository contents, and activates what is referred to as in-place deployments by deployment engine (Kudu).
PHP, Node, Python, Ruby and Java applications coded to serve static content:
- PHP: The images used for PHP runtime were configured to serve all static content in the content root folder. After this issue was brought to our attention, we updated all PHP images to disallow serving the .git folder as static content as a defense in depth measure.
- Node, Python, Java, and Ruby: For these languages since the application code controls whether it serves static content, we recommend customers review the code to make sure that only the relevant code is served out.
Not all users of Local Git were impacted. Customers who deployed code to App Service Linux via Local Git after files were already created in the application were the only impacted customers.
Azure App Service Windows is not impacted, as it runs in an IIS based environment.
Microsoft’s Response Microsoft’s Response
Microsoft took the following steps after this issue was brought to our attention:
- We updated all PHP images to disallow serving the .git folder as static content as a defense in depth measure.
- Notified customers who were impacted due to the activation of in-place deployment with specific guidance on how to mitigate the issue. We also notified customers who had the .git folder uploaded to the content directory.
- Updated our Security Recommendations document with an additional section on securing source code. We also updated the documentation for in-place deployments.
Technical details Technical details
Some web applications are coded to serve all files in the content folder as static content. If the .git folder (which contains the state and history of the source control repository) is also in the content folder in these applications, others are then able to download the files via requests to the web app.
The cases where the .git folder can be in the content folder are:
- Application code deployed via Local Git afterfiles were created or modified in the content root outside of Git.
- Explicit configuration to enable in-place deployments via SCM_REPOSITORY_PATH. This is an advanced user operation.
- When the .git folder is included with application code during non-GIT deployments to App Service.
The combination of the .git folder in content folder along with the application which serves out static content makes the app susceptible to source code exposure.
Wiz.io has posted a blog about this issue available here. We would like to thank Wiz.io who found this issue and worked closely with Microsoft to help secure our customers.
The MSRC Team