Loading HuntDB...

Misconfigured AWS S3 bucket leaks senstive data such of admin, Prdouction,beta, localhost and many more directories....

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by i_am_no__one

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
**Description:** It has been observed that the amazon s3 bucket which i believe belongs to DoD as it contains data related to Dod prod,admin,localhost documents and all is misconfigured as a result any unauthenticated users can access it without any restrictions ## Step-by-step Reproduction Instructions 1.Access following URL https://██████.s3.amazonaws.com/ so the bucket name is "█████████" 2.And we can see that we are successfully able to see all the contents present on it.Which confirms s3 bucket is misconfigured. 3.And to access contents of different directories we can use following cmd in terminal aws s3 ls s3://███/ aws s3 ls s3://████/██████/ aws s3 ls s3://███████/███████████████/ aws s3 ls s3://██████████/███████/ aws s3 ls s3://██████████/████/ and in a similar way ,we can access content of root or any directory which contains sensitive manuals , document and media files ## Suggested Mitigation/Remediation Actions configure s3 bucket properly to disable listing of such a sensitive files ## Impact Any unauthenticated user can access and download sensitive files present on DoD s3 storage.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic