Published Tue, Dec 13th, 2022
Platforms
A vulnerability in Elastic Container Registry (ECR) Public could have allowed a malicious actor to delete, update, or create ECR Public images, layers, or tags in registries and repositories belonging to any other AWS account, by abusing undocumented API calls. A malicious actor could have exploited this to delete any or all images in the Amazon ECR Public Gallery or update the content of any existing image to inject malicious code on any machine that would pull and run it.
ECR Public
None required
No tracked CVEs
Contributed by https://github.com/guycoldham
Entry Status
Finalized
Disclosure Date
Tue, Nov 15th, 2022
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
8.93
(PI:1.5/A1:20/A2:1/A7:1.1/A8:1.1)
Discovered by
Gafnit Amiga, Lightspin