Skip to content

Commit 98fd001

Browse files
authored
Update gcp-cloudbuild-privesc.md removing cloudbuild.builds.update
### `cloudbuild.builds.update` Currently this permission is listed to **only** be able to be used to use the api method `builds.cancel()` which cannot be abused to change the parameters of an ongoing build References: - https://cloud.google.com/build/docs/iam-roles-permissions#permissions - https://cloud.google.com/build/docs/api/reference/rest/v1/projects.builds/cancel
1 parent 67e7ec9 commit 98fd001

File tree

1 file changed

+0
-5
lines changed

1 file changed

+0
-5
lines changed

src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,11 +37,6 @@ You can find the original exploit script [**here on GitHub**](https://github.com
3737

3838
For a more in-depth explanation, visit [https://rhinosecuritylabs.com/gcp/iam-privilege-escalation-gcp-cloudbuild/](https://rhinosecuritylabs.com/gcp/iam-privilege-escalation-gcp-cloudbuild/)
3939

40-
### `cloudbuild.builds.update`
41-
42-
**Potentially** with this permission you will be able to **update a cloud build and just steal the service account token** like it was performed with the previous permission (but unfortunately at the time of this writing I couldn't find any way to call that API).
43-
44-
TODO
4540

4641
### `cloudbuild.repositories.accessReadToken`
4742

0 commit comments

Comments
 (0)