GitBook: [#2973] No subject

This commit is contained in:
CPol 2022-01-26 17:35:55 +00:00 committed by gitbook-bot
parent 027c94fea2
commit 9a9646f904
No known key found for this signature in database
GPG Key ID: 07D2180C7B12D0FF
2 changed files with 21 additions and 0 deletions

View File

@ -22,6 +22,22 @@ It's important to note also that in **GCP Service Accounts are both principals a
The permissions between parenthesis indicate the permissions needed to exploit the vulnerability with `gcloud`. Those might not be needed if exploiting it through the API.
{% endhint %}
## Privilege Escalation to Principals
Check all the **known permissions** that will allow you to **escalate privileges over other principals** in:
{% content-ref url="gcp-privesc-to-other-principals.md" %}
[gcp-privesc-to-other-principals.md](gcp-privesc-to-other-principals.md)
{% endcontent-ref %}
## Privilege Escalation to Resources
Check all the **known permissions** that will allow you to **escalate privileges over other resources** in:
{% content-ref url="gcp-privesc-to-resources.md" %}
[gcp-privesc-to-resources.md](gcp-privesc-to-resources.md)
{% endcontent-ref %}
## cloudbuild
### cloudbuild.builds.create

View File

@ -1,5 +1,10 @@
# GCP - Privesc to other Principals
{% hint style="info" %}
GCP has **hundreds of permissions**. This is just a list containing the **known** ones that could allow you to escalate to other principals.\
If you know about any other permissions not mentioned here, **please send a PR to add it** or let me know and I will add it.
{% endhint %}
## IAM
### iam.roles.update (iam.roles.get)