Skip to content

Commit f3afa73

Browse files
committed
Roles Anywhere explanation
1 parent 590e54e commit f3afa73

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,11 @@ aws_signing_helper credential-process \
135135
--role-arn arn:aws:iam::123456789012:role/Admin
136136
```
137137

138+
The trust anchor validates that the client certificate `readonly.pem` comes from its authorized CA, when the trust anchor was created the CA’s public certificate was included (and now used to validate `readonly.pem`). Inside `readonly.pem` is the public key, which AWS uses to verify that the signature was made with its corresponding private key `readonly.key`.
139+
140+
The certificate also proves identity and provides attributes (such as CN or OU) that the `default` profile transforms into tags, which the role’s trust policy can use to decide whether to authorize access, if there are no conditions in the trust policy, those tags are ignored and anyone with a valid certificate is allowed through.
141+
142+
For this attack to be possible, both the trust anchor and the default profile must be active.
138143

139144
### References
140145

0 commit comments

Comments
 (0)