Published Wed, Nov 28th, 2018
Platforms
Resource policies lacked a way of restricting service access to only your own account, allowing an attacker to leverage a service to potentially access your resources. Originally discovered by Dan Peebles and presented at re:Invent in 2018, this issue did not gain enough attention to be fixed until Shir Tamari and Ami Luttwak from Wiz presented it at Black Hat 2021.
N/A
Update existing vulnerable IAM policies by adding scoping condition.
No tracked CVEs
Contributed by https://github.com/a10ns
Entry Status
Finalized
Disclosure Date
Wed, Nov 28th, 2018
Exploitability Period
until February 2021
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Dan Peebles, Bridgewater