Researchers Detail AppSync Cross-Tenant Vulnerability in Amazon Web Services

News

Amazon Web Services (AWS) has resolved a cross-tenant vulnerability in its platform that could be weaponized by an attacker to gain unauthorized access to resources.

The issue relates to a confused deputy problem, a type of privilege escalation where a program that doesn’t have permission to perform an action can coerce a more-privileged entity to perform the action.

The shortcoming was reported by Datadog to AWS on September 1, 2022, following which a patch was shipped on September 6.

“This attack abuses the AppSync service to assume [identity and access management] roles in other AWS accounts, which allows an attacker to pivot into a victim organization and access resources in those accounts,” Datadog researcher Nick Frichette said in a report published last week.

CyberSecurity

In a coordinated disclosure, Amazon said that no customers were affected by the vulnerability and that no customer action is required.

It described it as a “case-sensitivity parsing issue within AWS AppSync, which could potentially be used to bypass the service’s cross-account role usage validations and take action as the service across customer accounts.”

AWS AppSync offers developers GraphQL APIs to retrieve or modify data from multiple data sources as well as automatically sync data between mobile and web applications and the cloud.

The service can also be used to integrate with other AWS services through specific roles designed to perform the necessary API calls with the required IAM permissions.

While AWS does have safeguards in place to prevent AppSync from assuming arbitrary roles by validating the role’s Amazon Resource Name (ARN), the problem stems from the fact that the check could be trivially bypassed by passing the “serviceRoleArn” parameter in a lower case.

This behavior could then be exploited to provide the identifier of a role in a different AWS account.

“This vulnerability in AWS AppSync allowed attackers to cross account boundaries and execute AWS API calls in victim accounts via IAM roles that trusted the AppSync service,” Frichette said.

“By using this method, attackers could breach organizations that used AppSync and gain access to resources associated with those roles.”

Products You May Like

Articles You May Like

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Palo Alto Networks Patches Critical Firewall Vulnerability
The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
Fake Donald Trump Assassination Story Used in Phishing Scam

Leave a Reply

Your email address will not be published. Required fields are marked *