Published Thu, Feb 3rd, 2022
Platforms
When customers attach a CodeBuild project to their VPC, CodeBuild’s build container will apply the same network routing rules as defined in the customer’s VPC Security Group. However, CodeBuild EC2 hosts retained Internet connectivity via AWS's own VPC, thus allowing an attacker to bypass any custom VPC rules the customer had set up, and use CodeBuild for data exfiltration from the targeted environment. AWS later updated the CodeBuild service to block all outbound network access for newly created CodeBuild projects which contain a customer-defined VPC configuration.
N/A
None required
No tracked CVEs
Contributed by https://github.com/ramimac
Entry Status
Finalized
Disclosure Date
Thu, Feb 3rd, 2022
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Aidan Steele
Compromise of internal AWS Glue service to assume the glue role in any AWS account that used glue.