New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Feb 14, 2025Ravie LakshmananVulnerability / DevOps

Cybersecurity researchers have disclosed a brand new kind of identify confusion assault known as whoAMI that permits anybody who publishes an Amazon Machine Picture (AMI) with a selected identify to realize code execution inside the Amazon Internet Companies (AWS) account.

“If executed at scale, this assault might be used to realize entry to hundreds of accounts,” Datadog Safety Labs researcher Seth Artwork said in a report shared with The Hacker Information. “The susceptible sample could be discovered in lots of non-public and open supply code repositories.”

At its coronary heart, the approach is a subset of a provide chain assault that entails publishing a malicious useful resource and tricking misconfigured software program into utilizing it as an alternative of the professional counterpart.

Cybersecurity

The assault exploits the truth that anybody can AMI, which refers to a digital machine picture that is used in addition up Elastic Compute Cloud (EC2) situations in AWS, to the neighborhood catalog and the truth that builders might omit to say the “–owners” attribute when searching for one by way of the ec2:DescribeImages API.

Put in another way, the identify confusion assault requires the beneath three circumstances to be met when a sufferer retrieves the AMI ID by means of the API –

  • Use of the identify filter,
  • A failure to specify both the proprietor, owner-alias, or owner-id parameters,
  • Fetching essentially the most the just lately created picture from the returned checklist of matching pictures (“most_recent=true”)

This results in a state of affairs the place an attacker can create a malicious AMI with a reputation that matches the sample specified within the search standards, ensuing within the creation of an EC2 occasion utilizing the risk actor’s doppelgänger AMI.

This, in flip, grants distant code execution (RCE) capabilities on the occasion, permitting the risk actors to provoke numerous post-exploitation actions.

All an attacker wants is an AWS account to publish their backdoored AMI to the general public Group AMI catalog and go for a reputation that matches the AMIs sought by their targets.

“It is extremely much like a dependency confusion attack, besides that within the latter, the malicious useful resource is a software program dependency (similar to a pip bundle), whereas within the whoAMI identify confusion assault, the malicious useful resource is a digital machine picture,” Artwork mentioned.

Datadog mentioned roughly 1% of organizations monitored by the corporate have been affected by the whoAMI assault, and that it discovered public examples of code written in Python, Go, Java, Terraform, Pulumi, and Bash shell utilizing the susceptible standards.

Following accountable disclosure on September 16, 2024, the difficulty was addressed by Amazon three days later. When reached for remark, AWS informed The Hacker Information that it didn’t discover any proof that the approach was abused within the wild.

“All AWS providers are working as designed. Based mostly on in depth log evaluation and monitoring, our investigation confirmed that the approach described on this analysis has solely been executed by the licensed researchers themselves, with no proof of utilization by every other events,” the corporate mentioned.

Cybersecurity

“This system might have an effect on prospects who retrieve Amazon Machine Picture (AMI) IDs by way of the ec2:DescribeImages API with out specifying the proprietor worth. In December 2024, we launched Allowed AMIs, a brand new account-wide setting that permits prospects to restrict the invention and use of AMIs inside their AWS accounts. We advocate prospects consider and implement this new security control.”

As of final November, HashiCorp Terraform has began issuing warnings to customers when “most_recent = true” is used with out an proprietor filter in terraform-provider-aws version 5.77.0. The warning diagnostic is expected to be upgraded to an error efficient model 6.0.0.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.

Leave a Reply