orca.security Open in urlscan Pro
192.0.66.46  Public Scan

URL: https://orca.security/resources/blog/cross-site-scripting-vulnerabilities-in-apache-services-azure-hd-insight/
Submission: On September 14 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="ais-SearchBox-form" novalidate="">
  <input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
  <button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
  <div class="ais-SearchBox-close">
    <span class="push-enter-text">Press enter to search</span>
    <button class="ais-SearchBox-reset-inner" aria-label="Close Search">
      <svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
          fill="white"></path>
      </svg>
    </button>
  </div>
</form>

Text Content

___

 * Search
 * Contact
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Platform
   Platform
   
   The Orca Platform
   
   Secure cloud infrastructure, workloads, data, APIs, and identities with our
   industry-leading agentless cloud-native application protection platform
   (CNAPP).
   
    * Platform Overview
   
    * Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    * Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    * Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    * Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
   
    * Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical
      risks
    * Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    * Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom
      checks
    * Shift Left Security
      Secure cloud-native apps across the SDLC
   
    * SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    * API Security
      Complete API discovery, security posture management, and drift detection
    * Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII

 * Why Orca
   Why Orca
   
   Case Studies
   
   Our customers worldwide trust Orca to secure their Cloud.
   
    * View Case Studies
   
   Why Orca
   
    * Why Orca
      Learn all about our purpose-built cloud security platform
    * Our Company
      Learn about our company, culture and team
    * Ratings & Reviews
      See what our users say about us
    * Security Research
      The latest discoveries from the Research Pod
   
   Compare Orca
   
    * Prisma Cloud
      Many acquisitions and little integration
    * Qualys TotalCloud
      Not nearly as total as you want
    * Lacework
      More complexity, less visibility
    * Aqua
      End up underwater with alert fatigue
   
    * Rapid7
      Work a lot harder for less
    * Tenable
      Fragmented coverage makes this untenable
    * CloudGuard
      Doesn’t check all the boxes
   
   Industries
   
    * Financial Services
    * Technology
    * Government
    * Retail
    * Healthcare
    * Media & Entertainment

 * Partners
   Partners
   
   Our Partners
   
   Our team is extended and strengthened by our strong partnerships across the
   Cloud Security ecosystem.
   
    * Partner Overview
   
    * Amazon Web Services
    * Microsoft Azure
    * Google Cloud
    * Alibaba Cloud
    * Oracle Cloud

 * Research
   Research
   
   Orca Research Pod
   
   Our expert security research team discovers and analyzes cloud risks and
   vulnerabilities to strengthen the Orca platform.
   
    * See Our Latest Discoveries
   
   Orca Research
   
   Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build
   
   Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames
   
   The Top 5 Cloud Security Risks of 2023 (so far)

 * Resources
   Resources
   
   Resource Library
   
   Download and view eBooks, whitepapers, videos and more in our packed Resource
   Library.
   
    * Browse Resources
   
   Blog
   
   Read Cloud Security thought leadership, how-to's, and insightful posts from
   Orca Security experts.
   
    * Browse Blogs
   
   Featured Resources
   
   Orca Events & Webinars – Register for Upcoming Webinars and Events
   
   2023 Gartner® Market Guide for Cloud-Native Application Protection Platforms
   (CNAPP)
   
   TAG Cyber Report Shows 207% ROI on the Orca Cloud Security Platform

 * About
   About
   
   Careers
   
   Join the Orca team, and help secure the cloud for the world's most innovative
   companies.
   
    * See Open Roles
   
    * Why Orca
    * Newsroom
    * Media & Press
    * About Us
    * Ratings & Reviews
    * Contact Us

 * Search
 * Contact
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Get Demo



Press enter to search
 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue
 * Cloud Risk
   BreakingFormation: Vulnerability in AWS CloudFormation
 * Blog
   Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production
   Checklists
 * Event
   Virtual Cloud Security Camp
 * On-Demand Webinar
   The Challenges of Securing & Monitoring Multi-Cloud Applications

 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue

View more results
 * Blog
 * Research Pod

Published: Sep 13, 2023


AZURE HDINSIGHT RIDDLED WITH XSS VULNERABILITIES VIA APACHE SERVICES

Lidor Ben Shitrit
Reading time: 13 Minutes

 * 
 * 
 * 
 * 

The Orca Research Pod recently discovered a total of 8 important Cross-Site
Scripting (XSS) vulnerabilities within various Apache services on Azure
HDInsight, a widely used managed service for open-source analytics. The
identified vulnerabilities consisted of 6 Stored XSS and 2 Reflected XSS
vulnerabilities, each of which could be exploited to perform unauthorized
actions, varying from data access to session hijacking and delivering malicious
payloads.

Orca uncovered the vulnerabilities by manipulating variables, exploiting
functions, and meticulously testing possible security loopholes. Upon the
discovery, we immediately informed the Microsoft Service Response Center (MSRC),
who were able to reproduce the issues and prioritize their remediation. All 8
XSS vulnerabilities were fixed in the August 8th HDInsight Security Update.

In this blog, we’ll describe how we discovered the vulnerabilities and what
their impact could have been on Azure HDInsight users, as well as how
organizations can protect against these types of XSS vulnerabilities.


EXECUTIVE SUMMARY

 * Orca discovered 8 important Cross-Site Scripting (XSS) vulnerabilities in
   Apache services, including Apache Hadoop, Spark, and Kafka, all operating
   under the umbrella of Azure HDInsight.
 * 6 were Stored XSS vulnerabilities and 2 were Reflected XSS vulnerabilities. 
 * All XSS vulnerabilities posed significant security risks to data integrity
   and user privacy in the vulnerable Apache services, including session
   hijacking and delivering malicious payloads, putting any user of the Apache
   services at risk, including Apache Hadoop, Spark, and Oozie.
 * Upon discovering the vulnerabilities, Orca promptly reported them to the MSRC
   team who immediately prioritized the cases. Orca and Microsoft then conducted
   several meetings to reproduce and remediate all issues.
 * Microsoft fixed all vulnerabilities in their Patch Tuesday on August 8, 2023.
 * XSS vulnerabilities can be dangerous but are nevertheless quite common.
   Recent examples are the Jenkins stored XSS, Zimbra XSS, and Azure Bastion and
   Azure Container Registry XSS vulnerabilities.
 * The fact that we found 8 important XSS vulnerabilities in Azure HDInsight via
   Apache Services in just a matter of days, calls into question the security of
   the service.
 * Organizations can reduce their risk of XSS attacks by applying best
   practices, such as implementing a Content Security Policy (CSP), performing
   input validation and output encoding, and adhering to the principle of least
   privilege.


ABOUT THE 8 XSS VULNERABILITIES IN AZURE HDINSIGHT

Below we have included an overview of the eight vulnerabilities that were found
in Azure HDInsight. To protect against these vulnerabilities, organizations must
apply Microsoft’s August 2023 security update.

NameSeverityXSS TypeImpactCVEStatus#1Azure HDInsight/Apache Ambari Stored XSS in
Background OperationsImportantStored XSSSpoofingCVE-2023-36881Fixed in August
8th Security Update#2Azure HDInsight/Apache Ambari Stored XSS via Managed
NotificationsImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th
Security Update#3Azure HDInsight/Apache Ambari Stored XSS in YARN Queue
ManagerImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th Security
Update#4Azure HDInsight/Jupyter Notebooks Code Execution via Stored
XSSImportantStored XSSSpoofingCVE-2023-35394Fixed in August 8th Security
Update#5Azure HDInsight/Apache Hadoop Reflected XSS via endpoint
manipulationImportantReflected XSSSpoofingCVE-2023-38188Fixed in August 8th
Security Update#6Azure HDInsight/Apache Hive 2 Reflected XSS via endpoint
manipulationImportantReflected XSSSpoofingCVE-2023-35393Fixed in August 8th
Security Update#7Azure HDInsight/Apache Ambari Stored XSS in YARN
ConfigurationsImportantStored XSSSpoofingCVE-2023-36881Fixed in August 8th
Security Update#8Azure HDInsight/Apache Oozie Web Console Stored XSS via Custom
FilterImportantStored XSSSpoofingCVE-2023-36877Fixed in August 8th Security
Update


WHAT IS AZURE HDINSIGHT?

Azure HDInsight is a fully managed, open-source analytics service provided by
Microsoft for processing big data workloads in a scalable and flexible way. It’s
essentially a cloud-based service that simplifies the management, processing,
and analysis of big data by offering a number of data processing frameworks like
Apache Hadoop, Apache Spark, Apache Kafka, and others.

HDInsight supports a wide range of data processing tasks with open-source
frameworks such as Apache Hadoop for batch processing, Apache Spark for
in-memory processing, Apache HBase for NoSQL data, Apache Storm and Kafka for
real-time processing, and Machine Learning with R Server.

HDInsight can be integrated with other Azure services. For example, you can
store and manage data using Azure Data Lake Storage or Azure Blob Storage.
Similarly, it can be integrated with Azure Data Factory for ETL operations,
Azure Synapse Analytics for warehousing, or Power BI for visualization.


WHAT IS CROSS-SITE SCRIPTING (XSS)?

Cross-Site Scripting (XSS) occurs when an attacker injects malicious scripts
into a trusted website, which are then executed by unsuspecting users’ browsers.
This can lead to unauthorized access, data theft, and even complete compromise
of the affected system. Recent examples are the Jenkins stored XSS, Zimbra XSS,
and Azure Bastion and Azure Container Registry XSS vulnerabilities.

All 8 XSS vulnerabilities discovered in various platforms and components in
Azure HDInsight primarily resulted from the lack of proper input sanitization.
This omission allowed malicious characters to be rendered once the dashboard was
loaded, demonstrating inadequate output encoding that fails to neutralize these
characters when rendered. Other factors also contributed, but the central issue
lies in the absence of appropriate measures to sanitize inputs.

These weaknesses collectively allow an attacker to inject and execute malicious
scripts when the stored data is retrieved and displayed to users. This goes for
both Stored XSS and Reflected XSS Cases.


STORED XSS VERSUS REFLECTED XSS VULNERABILITIES

Two common types of XSS vulnerabilities are Reflected XSS and Stored XSS. The
main difference between them are their execution mechanisms.

 * Reflected XSS: This type of attack occurs when a malicious script is inserted
   into a URL and is immediately reflected back to the user, executing only for
   those who click the specifically crafted link. 
 * Stored XSS: on the other hand, is when the malicious script is saved on the
   server and executed for any user viewing the affected page. The primary
   difference lies in the delivery: Reflected XSS targets individual requests,
   while Stored XSS is embedded in a web page and affects all users accessing
   it.


HOW WE DISCOVERED 8 XSS VULNERABILITIES IN JUST A FEW DAYS

Our initial encounter with XSS in Azure HDInsight was straightforward. We
discovered that the Apache Ambari Background operations had multiple parameters
that, by default, could be modified. After identifying this primary stored XSS
vulnerability, we expanded our investigation. Using various techniques, we
subsequently pinpointed seven more similar vulnerabilities.

Leveraging hands-on manipulation combined with in-depth exploration of the text
rendering engine, we were able to discover 8 XSS vulnerabilities in total, each
of which required a unique approach to exploit. By promptly documenting and
reporting these findings to MSRC, Microsoft was able to fix all the XSS
vulnerabilities in their August 2023 security update.

Click for sound





0:42










POC of how the XSS vulnerabilities could be exploited

Utilizing BurpSuite, we were able to craft and send specially tailored requests
to bypass the Apache Ambari dashboard’s native filters and sanitize problematic
characters commonly known to prevent XSS. 

This involved encoding payloads and exploiting weak or misconfigured input
validation, allowing us to manipulate user input in a manner that the server
would process and render as part of the HTML. Through an automated software
testing method known as fuzzing (Using the Intruder tool in Burpsuite), we
systematically explored various permutations of both standard and non-standard
XSS payloads, targeting different input fields and then observed how the
application handled them. 

By careful inspection of HTTP responses and analyzing the Document Object Model
(DOM), we were able to identify where the application was improperly escaping or
sanitizing the user-supplied input. 

We traced the execution flow to uncover how the payloads were processed and
manifested within the user’s browser. 


#1. AZURE HDINSIGHT/APACHE AMBARI STORED XSS IN BACKGROUND OPERATIONS

The first XSS that we found in Azure HDInsight was in Apache Ambari Background
operations, where we managed to modify default parameters by editing various
values. Due to a special characters filter that was included in the dashboard,
we weren’t able to modify the Background Operations parameters directly to a
malicious XSS payload, but we got round this by first modifying them to a valid
value, and then resending the request via Burpsuite.

Workflow:

 1. Create a new HDInsight Service on Azure Portal.
 2. Select the Interactive Query cluster type and set the version.
 3. Access the public endpoint of the service.
    Navigate to Services and select HDFS.
 4. Click on the Run Service Check option in Background Operations.
 5. Inspect the request made during this process.
    Modify the request to inject a simple HTML.
    
 6. Observe that the injected code is reflected and rendered.
    
    
 7. Proceed to inject a stored XSS payload which will be subsequently executed.
    
    
    


#2. AZURE HDINSIGHT/APACHE AMBARI STORED XSS VIA MANAGED NOTIFICATION

Stored XSS is found in the Managed Notifications component of Azure HDInsight’s
Apache Ambari. The vulnerability occurs when manipulating alert notifications.

Workflow:

 1. Navigate to the dashboard and select Alerts.
 2. Click on ACTIONS and then Managed Notifications.
 3. Create a new email notification with a sample name.
 4. Capture the request and inspect the returned status.
 5. Attempt to inject an HTML payload when creating a new alert.
 6. Upon deletion, a confirmation box displays the name of the alert.
 7. Inject a stored XSS payload and observe it being executed.


#3. AZURE HDINSIGHT/APACHE AMBARI STORED XSS IN YARN QUEUE MANAGER

The YARN Queue Manager in Azure HDInsight’s Apache Ambari for the HBase cluster
type is susceptible to a stored XSS. The vulnerability is present in the Access
Control functions.

Workflow:

 1. Navigate to the dashboard and select the YARN Queue Manager view.
 2. Select the root queue.
 3. Navigate to the Access Control and Status sections.
 4. Change the Administrator Queue to Custom and focus on Groups.
 5. Observe the limitations in this field due to comma-separation.
 6. Inject a simple HTML payload to verify the vulnerability.
    
    
    
 7. Inject a crafted malicious XSS payload and save to see it being
    automatically executed.
    
    


#4. AZURE HDINSIGHT/JUPYTER NOTEBOOKS CODE EXECUTION VIA STORED XSS

Azure HDInsight’s Jupyter Notebook service is vulnerable to a stored XSS which
can be further exploited to achieve remote code execution. The vulnerability
stems from bypassing the Caja compiler.

Workflow:

 1. Set up the Spark cluster and navigate to the Jupyter Notebook service.
 2. Create a new PySpark3 Notebook and test with sample code.
 3. Examine the actions, requests, and WebSocket communications triggered during
    execution.
 4. Test the Markdown feature in Jupyter and observe how the Caja compiler
    sanitizes JS code.
 5. Use a specific method to bypass the Caja sanitization process.
    
    
    
 6. Craft a malicious payload with a remote JS file evil.js.
 7. The evil.js file establishes a WebSocket communication and sends a reverse
    shell as a code payload.
    
 8. Set up a remote server to host the evil.js file and wait for an incoming
    reverse shell.
    


#5. AZURE HDINSIGHT/APACHE HADOOP REFLECTED XSS VIA ENDPOINT MANIPULATION

A reflected XSS vulnerability is present in Apache Hadoop’s ResourceManager UI
within Azure HDInsight. By altering the container endpoint and port, an XSS can
be executed.

Workflow:

 1. Access YARN from the dashboard inside the Hadoop Cluster.
 2. Select Node and then the red-highlighted Node link.
 3. Observe the container endpoint and port.
 4. Alter the path by removing the host and port.
 5. Change the entire path, observing the DNS callback for the default port
    (30060).
    
    
 6. Set up a Python server to listen on port 30060.
    
 7. Observe the execution of the XSS.
    


#6. AZURE HDINSIGHT/APACHE HIVE 2 REFLECTED XSS VIA ENDPOINT MANIPULATION

Apache Hive 2 within Azure HDInsight suffers from a reflected XSS vulnerability.
By modifying the container endpoint and hosting a malicious file, an XSS can be
executed.

Workflow:

 1. Click on the Public Endpoint after creating the HDInsight service.
 2. Access Hive Service from the dashboard.
 3. Click on Hive Interactive UI to see Running Instances.
 4. Click on the Container ID to view the container endpoint and port.
 5. Modify the Host (port cannot be changed) to point to your Collaborator.
    
    
 6. Set up a Python server to listen on port 15002.
 7. Host an xss.html file on the Python server.
    
 8. Modify the URL to execute the malicious file, executing the XSS.
    


#7. AZURE HDINSIGHT/APACHE AMBARI STORED XSS IN YARN CONFIGURATIONS

A stored XSS vulnerability resides within Apache Ambari’s YARN Queue Manager in
Azure HDInsight. By injecting JS code into specific YARN configurations, a
stored XSS is executed upon refreshing the queues.

Workflow:

 1. Access YARN Queue Manager.
 2. Set Node Locality Delay to 2 and click Save and Refresh Queues.
 3. Review the modifications in Burp.
    
 4. Experiment with different variables to find the injectable one
    (yarn.scheduler.capacity.resource-calculator).
 5. Modify the value and send a saveAndRefresh request.
    
 6. Refresh the queues; the next visit to the page will execute the Stored XSS.
    
    


#8. AZURE HDINSIGHT/APACHE OOZIE WEB CONSOLE STORED XSS VIA CUSTOM FILTER

The Apache Oozie Web Console in Azure HDInsight allows stored XSS via custom
filter manipulation. By injecting HTML and then JS XSS payloads, a stored XSS
can be set up to execute repeatedly.

Workflow:

 1. Access the Dashboard and select Oozie.
 2. Click on the relevant Active Oozie Web UI.
 3. Navigate to Custom filter.
 4. Click on the Custom Filter Button.
 5. Test HTML injection using an H1 tag.
 6. Refresh the page, and validate that the tag is rendered.
 7. Move to a JS XSS payload, and inject it.
    
 8. Observe the payload being executed.
    
 9. From this point, the payload will execute as a Stored XSS.


HOW CAN ORGANIZATIONS REDUCE EXPOSURE TO XSS VULNERABILITIES?

Even though these XSS vulnerabilities have now been fixed by Microsoft, it’s
still important to implement robust security practices to minimize the risk of
further XSS vulnerabilities. 

Below we list our recommendations to protect against XSS:

 1. Input Validation: Validate user inputs against expected formats, data types,
    and ranges. This mitigates the risk of script injection.
 2. Output Encoding: Use output encoding (HTML, JavaScript, and URL encoding) to
    ensure that user-generated data is properly sanitized before being displayed
    in web pages.
 3. Content Security Policy (CSP): Implement CSP to add an extra layer of
    security that can restrict the execution of scripts and minimize the
    potential impact of any XSS vulnerabilities.
 4. Use Frameworks and Libraries: Utilize modern web frameworks and libraries
    that incorporate security features by default. These frameworks often
    include mechanisms to prevent XSS vulnerabilities, such as automatic output
    encoding.
 5. Apply the principle of least privilege: By giving users and processes only
    the permissions required for their specific tasks, you limit the potential
    attack surface for an attacker to exploit. This means that even if an
    attacker manages to inject malicious scripts through an XSS vulnerability,
    they will have limited access to sensitive data and functionality due to the
    principle of least privilege.

The Orca Platform helps security teams apply the least privilege principle
across their accounts


ABOUT ORCA SECURITY

Orca’s agentless cloud security platform connects to your environment in minutes
and provides full visibility of all your assets on AWS, Azure, Google Cloud,
Kubernetes, and more. Orca detects, prioritizes, and helps remediate cloud risks
across every layer of your cloud estate, including vulnerabilities, malware,
misconfigurations, lateral movement risk, API risks, sensitive data at risk,
weak and leaked passwords, and overly permissive identities.

 * 
 * 
 * 
 * 

STAY IN THE LOOP

Keep up to date with everything you need to know about cloud security and our
latest research



By submitting my email address you agree to the use of my personal data in
accordance with Orca Security Privacy Policy.


RELATED ARTICLES


Blog

HOW THREAT RESEARCH CAN INFORM YOUR ORGANIZATION’S CLOUD SECURITY STRATEGY

Read now

Blog

ORCA’S AI-POWERED CLOUD ASSET SEARCH IS AS INTUITIVE AS ASKING A QUESTION

Read now
See Orca in action-> View a 10 minute recorded demo or sign up for a
personalized one-on-one walk-through.


 * PLATFORM
   
   
   * CLOUD SECURITY PLATFORM
     
     * Platform
     * SideScanning™ Technology
     * Context-Aware Security
     * Built-in Compliance
     * Automation & Customization
   
   
   * TECHNOLOGY ECOSYSTEM
     
     * Amazon Web Services
     * Microsoft Azure
     * Google Cloud Platform


 * SOLUTIONS
   
   
   * BY SOLUTION
     
     * Malware Detection
     * Vulnerability Management
     * Sensitive Data Detection
     * Container and Kubernetes Security
     * Multi-Cloud Compliance and Security
     * Cloud Security Posture Management (CSPM)
     * CIEM
     * Cloud Workload Protection Platform (CWPP)
     * Cloud Detection and Response (CDR)
     * Shift Left Security
     * API Security
     * Data Security and Posture Management (DSPM)
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Technology Services
     * Media & Entertainment
     * Healthcare
     * Retail


 * RESOURCES
   
   * * Library
     * Product Info
     * Podcast
     * Case Studies
     * Cloud Risk Encyclopedia
     * Blog
     * Events
   
   
   * COMPARISONS
     
     * Prisma Cloud Security 2022
     * Qualys Cloud Agent
     * Twistlock Container Security
     * Redlock Palo Alto
     * Rapid7 InsightVM
     * Check Point CloudGuard Dome9


 * COMPANY
   
   * * About
     * Partners
     * Reviews
     * Orca Research Pod
     * Careers
     * Newsroom
     * Media Kit
   * Contact
     * Support
     * Security Portal
     * Login


 * STAY IN TOUCH
   
   Get cloud security insights
   and the latest Orca news
   
   
   * 
   * 
   * 
   * 
   * 
   * 
   * 
   * 

--------------------------------------------------------------------------------

©2023 Orca Security. All rights reserved.

 * Privacy Policy
 * Terms of Use
 * Cookies Settings
 * Virtual Patent Marking

 * 
 * 
 * 
 * 


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy
Accept All Cookies Reject All
Cookies Settings



PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * TARGETING COOKIES


 * SOCIAL MEDIA COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

SOCIAL MEDIA COOKIES

Social Media Cookies


These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit. If you do not allow these cookies you may not be able
to use or see these sharing tools.

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All