Thousands of Web Apps at risk due to AWS configuration issue

by Jabez
27 comments

Amazon web services has revised its guidelines for customers to implement AWS’s Application Load Balancer (ALB) more securely. However, it remains uncertain whether all users will be informed of these changes. Recent research has highlighted a vulnerability in the ALB service that could allow attackers to bypass access controls and compromise web applications. This issue arises from how customers configure the service, rather than a software flaw. Specifically, the vulnerability is linked to the way AWS users set up authentication with the ALB.
Implementation issues are crucial in cloud security, much like an armored safe is ineffective if left unlocked. Security firm Miggo discovered that depending on the ALB’s authentication setup, an attacker could manipulate the handoff to a third-party authentication service, potentially gaining access to sensitive web applications and data. The researchers identified over 15,000 web applications with potentially vulnerable configurations. However, AWS disputes this figure, claiming that only a small fraction of their customers might be affected. AWS has reached out to these customers to suggest more secure configurations. Since AWS lacks direct access to clients’ cloud environments, the exact number of vulnerable setups remains an estimate.
Miggo researchers encountered this issue while working with a client, observing unusual behavior in a system’s validation process. This discovery underscores the complex interdependencies between customers and vendors. To exploit the vulnerability, an attacker would create an AWS account and ALB, sign their authentication token, and then alter configurations to mimic the target’s authentication service. This would allow the attacker to have AWS sign the token as if it originated from the target’s system, granting them access to the application. The attack requires targeting a misconfigured, publicly accessible application or one to which the attacker already has access, enabling them to escalate privileges.
AWS maintains that token forging is not a vulnerability within ALB, as it results from specific authentication configurations chosen by users. After Miggo disclosed their findings in April, AWS updated its documentation twice to enhance ALB authentication recommendations. On May 1, AWS advised adding validation before ALB signs tokens, and on July 19, they recommended using “security groups” to restrict traffic to only their ALB. AWS spokesperson Patrick Neighorn stated that the issue is not an authentication bypass of ALB or any AWS service, as it requires a bad actor to have direct connectivity to a misconfigured application. AWS advises customers to configure applications to accept requests solely from their ALB and follow ALB security best practices.
The changes AWS implemented address the attack path identified by Miggo researchers. However, since these involve altering customer configurations, they are not akin to a software patch that can be universally applied. Customers with vulnerable setups must learn about the new guidance, recognize its relevance, and implement the changes themselves.
This situation highlights the complexities of the Shared Responsibility Model, where the division of security responsibilities between cloud providers and users can be ambiguous. While this model has been in place for years, it continues to present challenges in ensuring all cloud customers achieve the desired security configurations.

 

 

 

 

You may also like

27 comments

Ruby4794 April 28, 2025 - 2:24 pm Reply
Zachary796 April 28, 2025 - 7:19 pm Reply
Jude2765 May 1, 2025 - 3:31 am Reply
Darryl3861 May 24, 2025 - 6:41 am

Cool partnership https://shorturl.fm/a0B2m

Reply
Brooks1788 May 25, 2025 - 10:38 pm Reply
Manuel2058 May 26, 2025 - 12:33 pm Reply
Jenny216 May 28, 2025 - 6:33 pm Reply
Ramona2017 May 28, 2025 - 7:04 pm Reply
Ken709 May 28, 2025 - 10:04 pm Reply
Robert1394 May 29, 2025 - 12:39 pm Reply
Linda2326 May 30, 2025 - 7:11 am Reply
Eduardo1148 May 30, 2025 - 5:42 pm Reply
Cooper1107 May 30, 2025 - 9:40 pm Reply
Helena3047 June 1, 2025 - 11:51 pm Reply
Jessica265 June 2, 2025 - 6:34 am Reply
Elinor2805 July 21, 2025 - 10:46 am Reply
Darius1038 July 21, 2025 - 4:22 pm Reply
Kim2569 July 25, 2025 - 7:45 pm Reply
Aniya1638 July 31, 2025 - 8:58 am Reply
Hector3225 August 2, 2025 - 11:54 pm Reply
Dennis2179 August 3, 2025 - 3:12 pm Reply
Francisco3232 August 11, 2025 - 4:47 pm Reply
Hayden3281 August 12, 2025 - 1:36 pm Reply
Emilie4745 August 13, 2025 - 5:55 pm Reply
Catherine946 August 18, 2025 - 10:48 am Reply
Georgia1539 August 19, 2025 - 11:12 pm Reply
Tomas4261 October 8, 2025 - 12:46 am Reply

Leave a Reply to Emilie4745 Cancel Reply

This website uses cookies to improve your experience. We will assume you're ok with this, but you can opt-out if you wish. Accept Read More