Skip to content

Commit

Permalink
Fixes wiz-sec#295: Add Codebuild token leakage
Browse files Browse the repository at this point in the history
  • Loading branch information
ramimac committed Apr 19, 2024
1 parent 7d4e9af commit c3835c8
Showing 1 changed file with 31 additions and 0 deletions.
31 changes: 31 additions & 0 deletions vulnerabilities/aws-codebuild-access-token-leak.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
title: AWS CodeBuild Token Leakage
slug: aws-codebuild-access-token-leak
cves: null
affectedPlatforms:
- AWS
affectedServices:
- AWS CodeBuild
image: https://images.unsplash.com/photo-1689349483530-bb7a0734d9fb?q=80&w=1344&auto=format&fit=crop&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D
severity: [critical / high / medium / low / null]
piercingIndexVector: {version: [version], A1: [A1], A2: [A2], etc.} (optional)
discoveredBy:
name: Carlos Polop
org: Halborn
domain: null
twitter: hacktricks_live
publishedAt: 2023/02/25
disclosedAt: 2023/01/18
exploitabilityPeriod: null
knownITWExploitation: null
summary: |
An attacker with elevated permissions in CodeBuild could leak
the configured credentials for Github/Bitbucket. This was possible by
configuring the http_proxy and https_proxy variables, which would allow
you to capture the credentials via MITM.
manualRemediation: |
None required
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://www.halborn.com/blog/post/halborn-discovers-and-discloses-vulnerability-in-aws-code-build
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-pentesting/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage

0 comments on commit c3835c8

Please sign in to comment.