Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion bugcrowd_templates.gemspec
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Gem::Specification.new do |spec|
spec.require_paths = ['lib']
spec.required_ruby_version = '>= 3.0'

spec.add_development_dependency 'bundler', '~> 2.6.3'
spec.add_development_dependency 'bundler', '~> 2.7.1'
spec.add_development_dependency 'pry', '~> 0.14.2'
spec.add_development_dependency 'rake', '~> 13.0.6'
spec.add_development_dependency 'rspec', '~> 3.12'
Expand Down
5 changes: 5 additions & 0 deletions submissions/description/cloud_security/guidance.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
Overly permissive Identity and Access Management (IAM) roles grant more permissions than necessary for a user or service to perform the intended functions of their role. A lack of least privilege creates a larger attack surface, allowing an attacker who compromises an entity with an overly permissive role to perform a larger set of actions. This can lead to unauthorized access, data manipulation, or full control over cloud resources.

**Business Impact**

This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.

**Steps to Reproduce**

1. Identify the following IAM role or policy that appears to have excessive permissions: {{IAM role/policy}}
1. Perform an action that is outside the normal scope of the role's intended function but is permitted by its overly broad policy: {{unintended action}}
1. Observe that the unintended action is successfully executed, demonstrating the excessive permissions

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
Publicly accessible IAM credentials occur when cloud access keys, secret keys, or other authentication tokens are exposed in public repositories, such as GitHub or public S3 buckets, logs, or insecure configurations. These credentials grant direct access to cloud accounts and resources. An attacker identifying these credentials can immediately gain unauthorized access, bypassing traditional security controls.

**Business Impact**

This vulnerability can result in data theft, deletion of critical resources, deployment of malicious infrastructure, and significant financial fraud. The business can face severe reputational damage, regulatory non-compliance, and loss of data and customer trust.

**Steps to Reproduce**

1. Use public code scanning tools, search engines, or specific credential-finding tools to search for exposed cloud credentials: {{tool or search query}}
1. Observe that a set of publicly accessible IAM access keys and secret keys is visible at the following location: {{location of exposed credentials}}
1. Run the following command to list or access resources in the associated cloud account: {{test PoC command}}
1. Observe that access is gained to the cloud account and its resources

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
Identity and Access Management (IAM) misconfigurations allows unauthorized users or services to perform actions they shouldn't be able to. This can occur when there are overly permissive permissions, roles are incorrectly assigned, or policies are not granular enough. An attacker exploiting this vulnerability could gain elevated privileges, access sensitive resources, or disrupt cloud services.

**Business Impact**

This vulnerability can lead to unauthorized data access, modification, or deletion, compromising data confidentiality and integrity. It can also result in financial losses due to unexpected cloud resource consumption or regulatory fines for compliance breaches.

**Steps to Reproduce**

1. Identify a cloud resource (e.g., S3 bucket, EC2 instance) with potentially misconfigured IAM policies: {{resource url}}
1. Attempt to access or modify the resource using credentials with insufficient intended permissions, or by exploiting an overly permissive role: {{attacker_role_or_credentials}}
1. Execute a command or API call that should normally be restricted: {{malicious_command}}
1. Observe that the unauthorized action is successfully performed

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
Disabled or insufficient logging occurs where critical security logs are either completely turned off, or the level of detail captured is inadequate for effective security monitoring and incident response. This can apply to various cloud services, including virtual machines, databases, serverless functions, and network flow logs. An attacker who gains access to the system with disabled or insufficient logging is able to do so undetected by security teams.

**Business Impact**

This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.

**Steps to Reproduce**

1. Identify the cloud service or resource where logging is expected to be enabled: {{service or resource}}
2. Review the logging configuration for this service or resource to determine if logging is disabled or set to a minimal level: {{logging configuration}}
3. Perform an action that should generate security logs (e.g., failed login attempts, unauthorized access attempts, configuration changes): {{action that should generate logs}}
4. Attempt to retrieve logs related to this action. Observe that no logs are generated, or that the logs lack the necessary detail to understand the action, confirming disabled or insufficient logging.

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
Logging and monitoring issues in cloud environments include deficiencies in collecting, storing, and analyzing security-relevant logs and metrics. Without proper logging and monitoring, detection, investigation, and response to security incidents becomes significantly challenging. An attacker who gains access to the system is able to do so undetected by security teams.

**Business Impact**

This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.

**Steps to Reproduce**

1. Identify a cloud service or resource with insufficient logging and monitoring: {{cloud_service_or_resource_id}}
1. Perform actions that should generate security logs (e.g., failed login attempts, unauthorized access attempts, configuration changes): {{actions that should generate logs}}
1. Attempt to locate and analyze the corresponding logs in the cloud provider's logging service or SIEM: {{logging platform or tool}}
1. Observe that critical security events are either not logged, are incomplete, or that alerts are not triggered for suspicious activities, indicating a deficiency

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
Web-based or API-driven control panels that provide privileged access to cloud applications or underlying infrastructure can be exposed to the internet or an untrusted network segment. These exposed debug or admin interfaces often lack robust authentication or have default credentials, which can allow an attacker to gain full control over systems and data.

**Business Impact**

This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.

**Steps to Reproduce**

1. Use web scanners, directory brute-forcing tools, or public search engines to identify potentially exposed debug or admin interfaces: {{scanning tool or search query used}}
2. Navigate to the identified interface URL: {{URL}}
3. Attempt to log in using default credentials, common weak passwords, or by bypassing authentication mechanisms: {{login attempt credentials}}
4. Observe that unauthorized access to the debug or admin interface is gained, allowing control over the application or infrastructure

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
Individual API paths or methods can be vulnerable due to design flaws, improper input validation, or insufficient authorization checks for specific operations. An attacker can exploit misconfigured services and APIs to gain unauthorized access to data, cause service disruptions, or abuse resources.

**Business Impact**

This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.

**Steps to Reproduce**

1. Identify an API endpoint that processes sensitive data or performs critical actions: {{sensitive api endpoint URL}}
2. Craft a request to the sensitive endpoint, attempting to access or modify data: {{crafted payload}}
3. Observe the API's response, noting the successful unauthorized access to data or execution of a restricted function

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
Misconfigured services and API issues refer to a broad category of vulnerabilities arising from improper setup, default settings, or inadequate hardening of cloud services and their APIs. This can include exposed admin and debug interfaces, as well as insecure API configurations. An attacker can exploit misconfigured services and APIs to gain unauthorized access to data, cause service disruptions, or abuse resources.

**Business Impact**

This vulnerability can result in financial losses and regulatory fines, as well as reputational damage and a loss of customer trust.

**Steps to Reproduce**

1. Identify the following cloud service or API that appears to be running with default or insecure configurations: {{service or API}}
1. Look at the configuration settings, default permissions, and exposed functionalities of the service/API: {{review method or tool}}
1. Interact with the service/API with the following payload: {{exploit action or payload}}
1. Observe that the misconfiguration allows unintended access, data leakage, or service manipulation

**Proof of Concept**

The screenshot(s) below demonstrate(s) the vulnerability:

{{screenshot}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Guidance

Provide a step-by-step walkthrough with a screenshot on how to access and exploit the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attempt to escalate the content spoofing vulnerability. If this is possible, provide a full Proof of Concept (PoC).
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Recommendation(s)

Harden cloud environments by enforcing least privilege on identities, encrypting data in transit and at rest, blocking public access to sensitive resources, and restricting admin interfaces to trusted networks. Implement proper network segmentation, enable logging and continuous monitoring, and audit configurations regularly using automated tools. Follow cloud security benchmarks and adopt defense-in-depth strategies.

For more information, view the following resources:

- <https://owasp.org/www-project-cloud-native-application-security-top-10/>
- <https://cloudsecurityalliance.org/artifacts/security-guidance-v4/>
Loading