Tuesday, July 2, 2024

AWS Patches Essential ‘FlowFixation’ Bug in Airflow Service to Forestall Session Hijacking

Mar 22, 2024NewsroomAmazon Internet Providers / Vulnerability

Session Hijacking

Cybersecurity researchers have shared particulars of a now-patched safety vulnerability in Amazon Internet Providers (AWS) Managed Workflows for Apache Airflow (MWAA) that could possibly be probably exploited by a malicious actor to hijack victims’ periods and obtain distant code execution on underlying cases.

The vulnerability, now addressed by AWS, has been codenamed FlowFixation by Tenable.

“Upon taking on the sufferer’s account, the attacker may have carried out duties comparable to studying connection strings, including configurations and triggering directed acyclic graphs (DAGS),” senior safety researcher Liv Matan stated in a technical evaluation.

“Underneath sure circumstances such actions can lead to RCE on the occasion that underlies the MWAA, and in lateral motion to different companies.”

Cybersecurity

The basis explanation for the vulnerability, per the cybersecurity agency, is a mix of session fixation on the internet administration panel of AWS MWAA and an AWS area misconfiguration that ends in a cross-site scripting (XSS) assault.

Session fixation is a net assault approach that happens when a consumer is authenticated to a service with out invalidating any present session identifiers. This allows the adversary to power (aka fixate) a recognized session identifier on a consumer in order that, as soon as the consumer authenticates, the attacker has entry to the authenticated session.

Session Hijacking

By abusing the shortcoming, a menace actor may have compelled victims to make use of and authenticate the attacker’s recognized session and in the end take over the sufferer’s net administration panel.

“FlowFixation highlights a broader subject with the present state of cloud suppliers’ area structure and administration because it pertains to the Public Suffix Listing (PSL) and shared-parent domains: same-site assaults,” Matan stated, including the misconfiguration additionally impacts Microsoft Azure and Google Cloud.

Tenable additionally identified that the shared structure – the place a number of clients have the identical guardian area – could possibly be a goldmine for attackers seeking to exploit vulnerabilities like same-site assaults, cross-origin points, and cookie tossing, successfully resulting in unauthorized entry, information leaks, and code execution.

Cybersecurity

The shortcoming has been addressed by each AWS and Azure including the misconfigured domains to PSL, thus inflicting net browsers to acknowledge the added domains as a public suffix. Google Cloud, then again, has described the difficulty as not “extreme sufficient” to advantage a repair.

“Within the case of same-site assaults, the safety influence of the talked about area structure is important, with heightened threat of such assaults in cloud environments,” Matan defined.

“Amongst these, cookie-tossing assaults and same-site attribute cookie safety bypass are significantly regarding as each can circumvent CSRF safety. Cookie-tossing assaults may also abuse session-fixation points.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles