A potential risk in the aws-lambda-ecs-run-task which can be used to privilege escalation.

Disclosed: 2024-12-27 14:40:27 By zolaer9527 To aws_vdp
Medium
Vulnerability Details
**Summary:** I found a potential risk in the aws-lambda-ecs-run-task when I deployed it in the awslabs repository on GitHub. The application created a function with a role that has too many excessive permissions. A malicious user could leverage these permissions to escalate his/her privilege in multiple ways. **Description:** The aws-lambda-ecs-run-task application creates a function named rLambdaFunction, which has a role named rLambdaFunctionRole with the arn:aws:iam::aws:policy/AdministratorAccess policy. The policy allows for any action on all resources. That means the attacker can leverage these permissions to escalate privileges. If a malicious controlled this function, he/she can directly do what he/she wants to do as a root. ## Impact ## Summary: A malicious user could leverage these permissions to escalate his/her privilege.
Actions
View on HackerOne
Report Stats
  • Report ID: 2894222
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report