You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Bug: S3 Bucket misconfiguration at https://github.com/rarible/service-core.git can lead to XSS or arbitrary malicious code injection i.e overwritten permission granted to other user.
#425
Open
bhartisaurav opened this issue
Feb 11, 2025
· 1 comment
Somehow this bucket has overwritten permission but not have listing permission to other users which could be fatal for organization as it could easily lead to XSS or arbitrary malicious code at your developer/user end because attacker can host its malicious files at your s3 bucket. So, this issue must be resolved immediately.
Over write the same test file with other file at public s3 bucket.
POC:
Write test file at public s3 bucket:
See the written content:
Overwrite another file at public s3 bucket:
See the overwritten content:
Impact of this vulnerability:
Malware Hosting: Attackers have uploaded malware to open buckets, leveraging them to distribute harmful software could lead to XSS or arbitrary malicious code inject which could be fatal for organization.
Increased Storage Costs: Abusers may upload large files or use the bucket for illegal purposes, significantly increasing AWS costs.
Customer Trust: If sensitive files or applications hosted in the bucket are tampered with, customers may lose confidence in the company.
Website Defacement: Open buckets hosting static websites have been exploited to deface content or inject malicious scripts.
Data Leaks: Several high-profile data breaches occurred due to misconfigured S3 buckets, exposing millions of sensitive records.
Remediation:
In your aws s3 dashboard, change the s3 bucket policy of this bucket so that other users cannot write/or access it.
Thanks & Regards,
The text was updated successfully, but these errors were encountered:
bhartisaurav
changed the title
S3 Bucket misconfiguration at https://github.com/rarible/service-core.git can lead to XSS or arbitrary malicious code injection i.e overwritten permission granted to other user.
Bug: S3 Bucket misconfiguration at https://github.com/rarible/service-core.git can lead to XSS or arbitrary malicious code injection i.e overwritten permission granted to other user.
Feb 11, 2025
S3 Bucket misconfiguration at https://github.com/rarible/service-core.git can lead to XSS or arbitrary malicious code injection i.e overwritten permission granted to other user.
Hi Team,
Hope Everything is going well on your side.
Recenlty, While going through your github code i came across a s3 bucket i.e.:
Bucket: https://s3.us-west-2.amazonaws.com/sing.serve
Somehow this bucket has overwritten permission but not have listing permission to other users which could be fatal for organization as it could easily lead to XSS or arbitrary malicious code at your developer/user end because attacker can host its malicious files at your s3 bucket. So, this issue must be resolved immediately.
Steps to reproduce:
Go to github repo: https://github.com/rarible/service-core.git
search bucket: sing.serve
POC:
Impact of this vulnerability:
Remediation:
Thanks & Regards,
The text was updated successfully, but these errors were encountered: