AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking

-

Session Hijacking

Cybersecurity researchers have shared particulars of a now-patched safety vulnerability in Amazon Net Companies (AWS) Managed Workflows for Apache Airflow (MWAA) that could possibly be doubtlessly exploited by a malicious actor to hijack victims’ classes and obtain distant code execution on underlying situations.

The vulnerability, now addressed by AWS, has been codenamed FlowFixation by Tenable.

“Upon taking on the sufferer’s account, the attacker may have carried out duties resembling studying connection strings, including configurations and triggering directed acyclic graphs (DAGS),” senior safety researcher Liv Matan mentioned in a technical evaluation.

“Underneath sure circumstances such actions may end up in RCE on the occasion that underlies the MWAA, and in lateral motion to different providers.”

Cybersecurity

The basis reason for the vulnerability, per the cybersecurity agency, is a mix of session fixation on the internet administration panel of AWS MWAA and an AWS area misconfiguration that leads to a cross-site scripting (XSS) assault.

Session fixation is an internet assault method that happens when a person is authenticated to a service with out invalidating any current session identifiers. This allows the adversary to power (aka fixate) a recognized session identifier on a person in order that, as soon as the person authenticates, the attacker has entry to the authenticated session.

Session Hijacking

By abusing the shortcoming, a menace actor may have compelled victims to make use of and authenticate the attacker’s recognized session and in the end take over the sufferer’s internet administration panel.

“FlowFixation highlights a broader subject with the present state of cloud suppliers’ area structure and administration because it pertains to the Public Suffix Listing (PSL) and shared-parent domains: same-site assaults,” Matan mentioned, including the misconfiguration additionally impacts Microsoft Azure and Google Cloud.

Tenable additionally identified that the shared structure – the place a number of clients have the identical dad or mum area – could possibly be a goldmine for attackers trying to exploit vulnerabilities like same-site assaults, cross-origin points, and cookie tossing, successfully resulting in unauthorized entry, knowledge leaks, and code execution.

Cybersecurity

The shortcoming has been addressed by each AWS and Azure including the misconfigured domains to PSL, thus inflicting internet browsers to acknowledge the added domains as a public suffix. Google Cloud, then again, has described the difficulty as not “extreme sufficient” to advantage a repair.

“Within the case of same-site assaults, the safety impression of the talked about area structure is critical, with heightened threat of such assaults in cloud environments,” Matan defined.

“Amongst these, cookie-tossing assaults and same-site attribute cookie safety bypass are notably regarding as each can circumvent CSRF safety. Cookie-tossing assaults can even abuse session-fixation points.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here

ULTIMI POST

Most popular