Security News > 2021 > December > 4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code

The Microsoft Azure App Service has a four-year-old vulnerability that could reveal the source code of web apps written in PHP, Python, Ruby or Node, researchers said, that were deployed using Local Git.
The Azure App Service is a cloud computing-based platform for hosting websites and web applications.
Local Git meanwhile allows developers to initiate a local Git repository within the Azure App Service container in order to deploy code straight to the server.
The issue arises because when using Local Git, the Git folder is also uploaded and publicly accessible on unpatched systems; it's placed in the "/home/site/wwwroot" directory, which anyone could access.
Microsoft did originally deploy a mitigation, in the form of adding a "Web.config" file to the Git folder within the public directory that restricted public access; it turns out this is an incomplete fix though.
Users who deployed code via FTP or Web Deploy or Bash/SSH which resulted in files getting initialized in the web app before any git deployment;.
News URL
https://threatpost.com/microsoft-azure-zero-day-source-code/177270/
Related news
- Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation (source)
- Azure, Microsoft 365 MFA outage locks out users across regions (source)
- Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws (source)
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws (source)
- 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update (source)
- Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score (source)
- XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells (source)
- Microsoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws (source)
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391) (source)
- Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws (source)