Published Mon, Aug 13th, 2018
Platforms
Attackers had put malicious AMIs in the marketplace to abuse the CLI''s way of selecting what AMI to use. Although the concept of planting malicious AMIs had existed for a while (ex. in the 2009 presentation "Clobbering the clouds" by Nicholas Arvanitis, Marco Slaviero, and Haroon Meer) it had not been used specifically to target this issue with the CLI.
EC2
Update CLI and other tools that create EC2s
CVE-2018-15869
Contributed by https://github.com/0xdabbad00
Entry Status
Finalized
Disclosure Date
Mon, Aug 13th, 2018
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Megan Marsh