Are cdk asset bucket names reserved in any way? #25125
Replies: 3 comments 1 reply
-
I've thought about this before too. There's nothing stopping anyone from creating buckets with these names. However, someone would only be able to do 100 of these per account without getting a limit increase request, which is a tiny number when there are 100 billion possible account IDs. I think if someone were to be malicious, they would be targeting someone whose account ID they have identified for this to have any realistic chance of impacting anyone. And yes, you would have to specify a custom qualifier if this were to happen to you. That's not an awful workaround to have to do even if it's not ideal, so I seriously doubt anyone would do this if they were trying to actually accomplish anything with the malicious activity. |
Beta Was this translation helpful? Give feedback.
-
Limit of 100 buckets doesn't prevent an attacker that knows account ID upfront to block somebody's deployment. If there's a fresh account and attacker learns its ID somehow, he may target that account ID only to prevent smooth CDK deployments. Also, requirement for this bucket to exist (cdk-hnb659fds-assets-{ACCOUNTID}-{REGION}) isn't mentioned anywhere in Could somebody please update that docs to ensure assets bucket are explicitly listed in prerequisites? |
Beta Was this translation helpful? Give feedback.
-
well, it is worse than that: an attacker would set up his own S3 bucket, give the victim write permissions and provide malicious content there. Malicious content can be provided upfront, or by connect that bucket to S3 Notifications that will overwrite files uploaded by victim. So IMO it is a vulnerability. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
All CDK asset S3 buckets follow the cdk-hnb659fds-assets-{ACCOUNTID}-{REGION} syntax for their names by default and is used implicit everywhere unless you provide a custom qualifier.
Is there something stopping anyone with malicious intent to "bulk create" buckets with "my" account ids/regions and effectively blocking me from a smooth CDK experience?
Or is CDK toolset based on the assumption that everyone is playing along nicely, and if not, you would be forced to specify a custom qualifier to bootstrap/deploy with?
Beta Was this translation helpful? Give feedback.
All reactions