- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
The original post: /r/netsec by /u/Pale_Fly_2673 on 2024-08-09 23:01:51.
TL;DR: Uncovered Six Critical AWS Vulnerabilities
We uncovered six severe vulnerabilities in AWS services that exploited predictable S3 bucket names. These vulnerabilities allowed attackers to intercept and manipulate service resources, potentially leading to full account takeovers (depending on the service role’s permissions):
- CloudFormation: Allowed attackers to execute remote code and manipulate data, potentially leading to a full account takeover.
- Glue: Enabled remote code execution and data exfiltration by injecting malicious code into ETL jobs.
- EMR: Made it possible for attackers to inject malicious code into Jupyter notebooks, leading to RCE/XSS .
- SageMaker: data leakage and manipulation, which could alter machine learning model outputs and expose sensitive information.
- ServiceCatalog: Allowed attackers to inject resources into CloudFormation templates, deploying malicious components or unauthorized admin roles.
- CodeStar: Facilitated denial of service (DoS) attacks by blocking legitimate service use.
In four out of these six vulnerabilities, attackers needed only the victim’s account ID to execute the exploit. This highlights the importance of treating AWS account IDs as confidential information.
Our blog,details these vulnerabilities, describing the “Shadow Resource” attack vector and the “Bucket Monopoly” technique. AWS has fixed these vulnerabilities, but similar attack vectors may still exist in open-source projects and other scenarios.
For detailed insights, mitigation strategies, check out our blog.