Hacker News new | past | comments | ask | show | jobs | submit login
Investigating Privilege Escalation Methods in AWS (bishopfox.com)
58 points by alg2000 on Dec 21, 2019 | hide | past | favorite | 5 comments



None of these seem very interesting or tricky to me. The fact that users with the ability to edit permission structure things can leverage that to give themselves more permissions just seems kind of obvious.


I don’t think shown like this they’re meant to be “tricky”, but there are so many tutorials and example policies out there that don’t fully specify their IAM policies and would run afoul of these if they were used as-is.


Agree... Was hoping for something novel ... I sent this to my newer coworkers, but this is mostly obvious for people with 1+ years of experience making policies

In short: don't give passrole permission, or any IAM policy modification policy to people. If you do, yes, privilege escalation is possible


The Privilege Escalation attack vector can be avoided by using a capability-based security model, ala: https://storj.io/blog/2019/12/secure-access-control-in-the-d...


How is this relevant? AFAICT AWS Policy statements are capabilities. Each policy statement denotes both actions and resources, and that policy is then granted to another identity/resource.

As noted by other comments the parent article focuses on capabilities that grant definition of capabilities. It shouldn't be surprising that principals can use that to establish further capabilities in the absence of other restrictions.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: