Source |
GB Hacker |
Identifiant |
8669861 |
Date de publication |
2025-04-30 08:35:49 (vue: 2025-04-30 09:07:22) |
Titre |
AWS par défaut ouvre des chemins d'attaque furtifs permettant une escalade et un compromis de compte AWS Defaults Open Stealthy Attack Paths Enabling Privilege Escalation and Account Compromise |
Texte |
> Une enquête récente des chercheurs en sécurité a exposé des vulnérabilités critiques dans les rôles IAM par défaut de plusieurs offres d'Amazon Web Services (AWS), notamment SageMaker, Glue et EMR, ainsi que des projets open-source comme Ray. Ces rôles, souvent créés ou recommandés automatiquement lors de la configuration du service, sont livrés avec des politiques trop permissives telles que Amazons3fullAccess. Cet accès large, […]
>A recent investigation by security researchers has exposed critical vulnerabilities in the default IAM roles of several Amazon Web Services (AWS) offerings, including SageMaker, Glue, and EMR, as well as open-source projects like Ray. These roles, often automatically created or recommended during service setup, come with overly permissive policies such as AmazonS3FullAccess. This broad access, […]
|
Notes |
★★
|
Envoyé |
Oui |
Condensat |
access account amazon amazons3fullaccess attack automatically aws broad come compromise created critical default defaults during emr enabling escalation exposed glue has iam including investigation like offerings often open overly paths permissive policies privilege projects ray recent recommended researchers roles sagemaker security service services setup several source stealthy such these vulnerabilities web well |
Tags |
Vulnerability
|
Stories |
|
Move |
|