Skip to content

Commit ce043d5

Browse files
authored
Merge pull request #563 from bugcrowd/Q3-VRT-Update
Cloud Security VRT Additions
2 parents 7075477 + 3e71a28 commit ce043d5

File tree

69 files changed

+655
-51
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+655
-51
lines changed

bugcrowd_templates.gemspec

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Gem::Specification.new do |spec|
1919
spec.require_paths = ['lib']
2020
spec.required_ruby_version = '>= 3.0'
2121

22-
spec.add_development_dependency 'bundler', '~> 2.6.3'
22+
spec.add_development_dependency 'bundler', '~> 2.7.1'
2323
spec.add_development_dependency 'pry', '~> 0.14.2'
2424
spec.add_development_dependency 'rake', '~> 13.0.6'
2525
spec.add_development_dependency 'rspec', '~> 3.12'
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Guidance
2+
3+
Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.
4+
5+
Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Guidance
2+
3+
Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.
4+
5+
Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Guidance
2+
3+
Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.
4+
5+
Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# Recommendation(s)
2+
3+
Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.
4+
5+
For more information, view the following resources:
6+
7+
- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
8+
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
Overly permissive Identity and Access Management (IAM) roles grant more permissions than necessary for a user or service to perform the intended functions of their role. A lack of least privilege creates a larger attack surface, allowing an attacker who compromises an entity with an overly permissive role to perform a larger set of actions. This can lead to unauthorized access, data manipulation, or full control over cloud resources.
2+
3+
**Business Impact**
4+
5+
This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.
6+
7+
**Steps to Reproduce**
8+
9+
1. Identify the following IAM role or policy that appears to have excessive permissions: {{IAM role/policy}}
10+
1. Perform an action that is outside the normal scope of the role's intended function but is permitted by its overly broad policy: {{unintended action}}
11+
1. Observe that the unintended action is successfully executed, demonstrating the excessive permissions
12+
13+
**Proof of Concept**
14+
15+
The screenshot(s) below demonstrate(s) the vulnerability:
16+
17+
{{screenshot}}
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Guidance
2+
3+
Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.
4+
5+
Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# Recommendation(s)
2+
3+
Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.
4+
5+
For more information, view the following resources:
6+
7+
- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
8+
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
Publicly accessible IAM credentials occur when cloud access keys, secret keys, or other authentication tokens are exposed in public repositories, such as GitHub or public S3 buckets, logs, or insecure configurations. These credentials grant direct access to cloud accounts and resources. An attacker identifying these credentials can immediately gain unauthorized access, bypassing traditional security controls.
2+
3+
**Business Impact**
4+
5+
This vulnerability can result in data theft, deletion of critical resources, deployment of malicious infrastructure, and significant financial fraud. The business can face severe reputational damage, regulatory non-compliance, and loss of data and customer trust.
6+
7+
**Steps to Reproduce**
8+
9+
1. Use public code scanning tools, search engines, or specific credential-finding tools to search for exposed cloud credentials: {{tool or search query}}
10+
1. Observe that a set of publicly accessible IAM access keys and secret keys is visible at the following location: {{location of exposed credentials}}
11+
1. Run the following command to list or access resources in the associated cloud account: {{test PoC command}}
12+
1. Observe that access is gained to the cloud account and its resources
13+
14+
**Proof of Concept**
15+
16+
The screenshot(s) below demonstrate(s) the vulnerability:
17+
18+
{{screenshot}}
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# Recommendation(s)
2+
3+
Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.
4+
5+
For more information, view the following resources:
6+
7+
- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
8+
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>

0 commit comments

Comments
 (0)