CloudFormation change set privilege escalation
dev.to·23h·
Discuss: DEV
Flag this post

About a year ago, during a review of our cloud infrastructure, my colleague Martin Birtel from our InfoSec department, discovered that a specific AWS managed policy can give hackers super powers.

The finding was related to the role SecretsManagerReadWrite which was attached to a Lambda responsible for credential management.

This is a great cocktail for an account takeover as you’ll see below.

The SecretsManagerReadWrite managed policy includes surprising CloudFormation permissions:

{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "BasePermissions",
"Effect" : "Allow",
"Action" : [...

Similar Posts

Loading similar posts...