Cybersecurity researchers have found a number of vital flaws in Amazon Net Companies (AWS) choices that, if efficiently exploited, may lead to severe penalties.
“The influence of those vulnerabilities vary between distant code execution (RCE), full-service person takeover (which could present highly effective administrative entry), manipulation of AI modules, exposing delicate knowledge, knowledge exfiltration and denial of service,” cloud safety agency Aqua mentioned in an in depth report shared with The Hacker Information.
Following accountable disclosure in February 2024, Amazon addressed the shortcomings over a number of months from March to June. The findings had been introduced at Black Hat USA 2024.
Central to the difficulty, dubbed Bucket Monopoly, is an assault vector known as Shadow Useful resource, which, on this case, refers back to the automated creation of an AWS S3 bucket when utilizing companies like CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar.
The S3 bucket identify created on this method is each distinctive and follows a predefined naming conference (“cf-templates-{Hash}-{Area}”). An attacker may make the most of this habits to arrange buckets in unused AWS areas and await a legit AWS buyer to make use of one of many vulnerable companies to realize covert entry to the contents of the S3 bucket.
Primarily based on the permissions granted to the adversary-controlled S3 bucket, the method might be used to escalate to set off a DoS situation, or execute code, manipulate or steal knowledge, and even acquire full management over the sufferer account with out the person’s data.
To maximise their probabilities of success, utilizing Bucket Monopoly, attackers can create unclaimed buckets upfront in all out there areas and retailer malicious code within the bucket. When the focused group permits one of many susceptible companies in a brand new area for the primary time, the malicious code shall be unknowingly executed, probably ensuing within the creation of an admin person that may grant management to the attackers.
![]() |
| Overview of CloudFormation vulnerability |
Nevertheless, it is vital to contemplate that the attacker should await the sufferer to deploy a brand new CloudFormation stack in a brand new area for the primary time to efficiently launch the assault. Modifying the CloudFormation template file within the S3 bucket to create a rogue admin person additionally is dependent upon whether or not the sufferer account has permission to handle IAM roles.
![]() |
| Overview of Glue vulnerability |
![]() |
| Overview of CodeStar vulnerability |
Aqua mentioned it discovered 5 different AWS companies that depend on an analogous naming methodology for the S3 buckets – {Service Prefix}-{AWS Account ID}-{Area} – thereby exposing them to Shadow Useful resource assaults and finally allowing a menace actor to escalate privileges and carry out malicious actions, together with DoS, info disclosure, knowledge manipulation, and arbitrary code execution –
- AWS Glue: aws-glue-assets-{Account-ID}-{Area}
- AWS Elastic MapReduce (EMR): aws-emr-studio -{Account-ID}-{Area}
- AWS SageMaker: sagemaker-{Area}-{Account-ID}
- AWS CodeStar: aws-codestar-{Area}-{Account-ID}
- AWS Service Catalog: cf-templates-{Hash}-{Area}

The corporate additionally famous that AWS account IDs ought to be thought of a secret, opposite to what Amazon states in its documentation, as they might be used to stage related assaults.
“This assault vector impacts not solely AWS companies but in addition many open-source tasks utilized by organizations to deploy assets of their AWS environments,” Aqua mentioned. “Many open-source tasks create S3 buckets mechanically as a part of their performance or instruct their customers to deploy S3 buckets.”
“As a substitute of utilizing predictable or static identifiers within the bucket identify, it’s advisable to generate a singular hash or a random identifier for every area and account, incorporating this worth into the S3 bucket identify. This method helps shield towards attackers claiming your bucket prematurely.”





