Skip to content

Conversation

@hasshido
Copy link
Contributor

@hasshido hasshido commented Aug 4, 2025

Hi @carlospolop !

While doing GRTE I noticed a couple things that could be updated/improved here:

  1. There's a much quicker way to abuse cloudbuild.builds.create, iam.serviceAccounts.actAs. As of today, there's no need to use the linked scripts, as it is possible to trigger the build with the inline YAML directly through the gcloud cli.

  2. After investigating a bit more about cloudbuild.builds.update, I saw on the gcloud docs that the only api permission it seems to give right now is to allow cancelling builds, which wouldn't allow for privilege escalation at the moment. For that reason, I'd suggest to remove it from the page to reduce noise and confusion.

PS: If you do not consider this to be up-to-standard regarding the exam points, just let me know so I can keep that into consideration to make extra PRs 👍

I just thought this would be a nice update ^_^. Have a nice day!

hasshido added 3 commits July 30, 2025 21:00
Includes direct gcloud command descriptioon to exploit this permission.
### `cloudbuild.builds.update`

Currently this permission is listed to **only** be able to be used to use the api method `builds.cancel()` which cannot be abused to change the parameters of an ongoing build

References:
- https://cloud.google.com/build/docs/iam-roles-permissions#permissions
- https://cloud.google.com/build/docs/api/reference/rest/v1/projects.builds/cancel
@hasshido hasshido changed the title grte-migthocho grte-mightocho Aug 18, 2025
@carlospolop
Copy link
Collaborator

Nice one @hasshido !

@carlospolop carlospolop merged commit e6b5f1a into HackTricks-wiki:master Aug 18, 2025
github-actions bot pushed a commit that referenced this pull request Aug 29, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants