CVE-2023-51651 – Potential URI resolution path traversal in the AWS SDK for PHP
https://notcve.org/view.php?id=CVE-2023-51651
AWS SDK for PHP is the Amazon Web Services software development kit for PHP. Within the scope of requests to S3 object keys and/or prefixes containing a Unix double-dot, a URI path traversal is possible. The issue exists in the `buildEndpoint` method in the RestSerializer component of the AWS SDK for PHP v3 prior to 3.288.1. The `buildEndpoint` method relies on the Guzzle Psr7 UriResolver utility, which strips dot segments from the request path in accordance with RFC 3986. Under certain conditions, this could lead to an arbitrary object being accessed. • https://github.com/aws/aws-sdk-php/commit/aebc9f801438746ac4ade327551576cb75f635f2 https://github.com/aws/aws-sdk-php/releases/tag/3.288.1 https://github.com/aws/aws-sdk-php/security/advisories/GHSA-557v-xcg6-rm5m • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-2582 – Exposure of unencrypted plaintext hash in github.com/aws/aws-sdk-go
https://notcve.org/view.php?id=CVE-2022-2582
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it. AWS S3 Crypto SDK envía un hash no cifrado del texto plano junto con el texto cifrado como un campo de metadatos. Este hash se puede utilizar para forzar el texto plano, si el hash es legible para el atacante. • https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1 https://pkg.go.dev/vuln/GO-2022-0391 • CWE-326: Inadequate Encryption Strength •
CVE-2022-4725 – AWS SDK XML Parser XpathUtils.java XpathUtils server-side request forgery
https://notcve.org/view.php?id=CVE-2022-4725
A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. • https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b https://github.com/aws-amplify/aws-sdk-android/pull/3100 https://github.com/aws-amplify/aws-sdk-android/releases/tag/release_v2.59.1 https://vuldb.com/?id.216737 • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2018-19981
https://notcve.org/view.php?id=CVE-2018-19981
Amazon AWS SDK <=2.8.5 for Android uses Android SharedPreferences to store plain text AWS STS Temporary Credentials retrieved by AWS Cognito Identity Service. An attacker can use these credentials to create authenticated and/or authorized requests. Note that the attacker must have "root" privilege access to the Android filesystem in order to exploit this vulnerability (i.e. the device has been compromised, such as disabling or bypassing Android's fundamental security mechanisms). Amazon AWS SDK, en versiones 2.8.5 y anteriores, utiliza la clase "Android SharedPreferences" para almacenar las credenciales temporales de AWS STS recuperadas por AWS Cognito Identity Service. Un atacante puede utilizar estas credenciales para crear peticiones autenticadas y/o autorizadas. • https://aws-amplify.github.io/aws-sdk-android/docs/reference/com/amazonaws/auth/CognitoCachingCredentialsProvider.html https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_01.png https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_02.png https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_03.png • CWE-312: Cleartext Storage of Sensitive Information •