2025-03-02 03:03:52 +00:00

90 lines
5.7 KiB
JSON

{
"id": "CVE-2025-23206",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T21:15:12.003",
"lastModified": "2025-01-17T21:15:12.003",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current `tls.connect` method will always set `rejectUnauthorized: false` which is a potential security concern. CDK should follow the best practice and set `rejectUnauthorized: true`. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in `cdk.context.json` or `cdk.json`. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "AWS Cloud Development Kit (AWS CDK) es un software de desarrollo de c\u00f3digo abierto framework para definir la infraestructura de la nube en c\u00f3digo y aprovisionarla a trav\u00e9s de AWS CloudFormation. Los usuarios que usan el paquete de proveedor de recursos personalizado de IAM OIDC descargar\u00e1n CA Thumbprints como parte del flujo de trabajo de recursos personalizado. Sin embargo, el m\u00e9todo `tls.connect` actual siempre establecer\u00e1 `rejectUnauthorized: false`, lo que es un posible problema de seguridad. CDK deber\u00eda seguir las mejores pr\u00e1cticas y establecer `rejectUnauthorized: true`. Sin embargo, esto podr\u00eda ser un cambio radical para las aplicaciones CDK existentes y deber\u00edamos solucionarlo con una marca de funci\u00f3n. Tenga en cuenta que esto est\u00e1 marcado como un aviso de seguridad de baja gravedad porque la URL del emisor la proporcionan los usuarios de CDK que definen la aplicaci\u00f3n CDK. Si insisten en conectarse a un proveedor de OIDC no autorizado, CDK no deber\u00eda prohibirlo. Adem\u00e1s, el bloque de c\u00f3digo se ejecuta en un entorno Lambda que mitiga el ataque MITM. El parche est\u00e1 en proceso. Para mitigar este problema, actualice a CDK v2.177.0 (fecha de lanzamiento prevista: 22/02/2025). Una vez actualizado, los usuarios deben asegurarse de que la marca de funci\u00f3n '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' est\u00e9 configurada como verdadera en `cdk.context.json` o `cdk.json`. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 1.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts#L34",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aws/aws-cdk/issues/32920",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aws/aws-cdk/security/advisories/GHSA-v4mq-x674-ff73",
"source": "security-advisories@github.com"
}
]
}