Skip to content

Commit

Permalink
Fixes #290: Appflow Ronin.ae issues (#299)
Browse files Browse the repository at this point in the history
* Fixes #290: Appflow Ronin.ae issues

* Update aws-appflow-undocumented-api.yaml

---------

Co-authored-by: Merav <83602216+mer-b@users.noreply.github.com>
  • Loading branch information
ramimac and mer-b committed Jul 23, 2024
1 parent 6f6e3d1 commit fe6fffa
Show file tree
Hide file tree
Showing 2 changed files with 61 additions and 0 deletions.
31 changes: 31 additions & 0 deletions vulnerabilities/aws-appflow-undocumented-api.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
title: AWS AppFlow secrets disclosure
slug: aws-appflow-secrets-disclosure
cves: null
affectedPlatforms:
- AWS
affectedServices:
- AppFlow
image: https://images.unsplash.com/photo-1620027242961-c4c1e9f5c6a0?q=80&w=2070&auto=format&fit=crop&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D
severity: low
discoveredBy:
name: null
org: Ronin
domain: https://ronin.ae
twitter: null
publishedAt: 2023/11/06
disclosedAt: 2023/06/24
exploitabilityPeriod: null
knownITWExploitation: false
summary: |
AppFlow had an undocumented service called sandstoneconfigurationservicelambda.
An undocumented field (awsOwnedManagedAppCredentialsArn) could be used during
connector registration and connector updates. Specifying a victim's Secret ARN
as that field disclosed the clientId and clientSecret, so long as the victim
Secret ARN belonged to a connection profile which is of the type
OAuth or contains clientId and clientSecret.
manualRemediation: |
None required
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://ronin.ae/news/amazon-appflow-vulnerabilities/
30 changes: 30 additions & 0 deletions vulnerabilities/aws-appflow-woocommerce-connector-ssrf.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
title: AWS AppFlow WooCommerce SSRF
slug: aws-appflow-woocommerce-ssrf
cves: null
affectedPlatforms:
- AWS
affectedServices:
- AppFlow
image: https://images.unsplash.com/photo-1482685945432-29a7abf2f466?q=80&w=1489&auto=format&fit=crop&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D
severity: low
discoveredBy:
name: null
org: Ronin
domain: https://ronin.ae
twitter: null
publishedAt: 2023/11/06
disclosedAt: 2023/06/21
exploitabilityPeriod: null
knownITWExploitation: false
summary: |
The AppFlow WooCommerce connector allowed specification of a full URL.
The connector included details of response content when the URL
offered an unexpected response. This means you could make arbitrary
GET requests to any URL from the WooCommerce connector, and view the
response content. The response in the error was truncated to 500 characters.
manualRemediation: |
None required
detectionMethods: null
contributor: https://github.com/ramimac
references:
- https://ronin.ae/news/amazon-appflow-vulnerabilities/

0 comments on commit fe6fffa

Please sign in to comment.