Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A potential risk in the amazon-ebs-migration-utility which can be used to leak sensitive data. #3

Open
zolaer9527 opened this issue Jul 11, 2024 · 0 comments

Comments

@zolaer9527
Copy link

zolaer9527 commented Jul 11, 2024

Hello! I discovered a potential security risk in the amazon-ebs-migration-utility application when I deployed it in the AWS Serverless Application Repository.

Detailed Analysis:

The amazon-ebs-migration-utility application creates a function named EBSVolumeConverter, and the associated role is LambdaRole with permissions such as "iam:GetRole" and "iam:ListRoles" for "*" resources. These permissions could be exploited by a malicious user to gain access to all the roles in the account, resulting in information leakage.

Mitigation Discussion:

Roles should not be granted any permissions regarding IAM resources. If it does not affect the normal function of the application, you can remove these two permissions. Or you can use the specific resource names to restrict the permissions.

Questions:

  1. Is this a confirmed issue with the amazon-ebs-migration-utility application?
  2. If it is indeed an issue, can any of the suggested mitigation measures be implemented to address this problem?
  3. If there are plans to rectify this issue, could you give me a CVE as a reward for my findings?

I'm looking forward to hearing back from you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant