Open S3 Bucket Accessible by any Aws User
None
G
GoCD
Submitted None
Actions:
Reported by
x_sh4dow
Vulnerability Details
Technical details and impact analysis
Description:
It has been observed that the amazon s3 bucket which i believe belongs to GoCD as it contains data related to GoCD █████ documents and all is misconfigured as a result any unauthenticated users can access it without any restrictions
Step-by-step Reproduction Instructions
1.Access following URL
https://█████████.s3.amazonaws.com/
so the bucket name is "███"
2.And we can see that we are successfully able to see all the contents present on it.Which confirms s3 bucket is misconfigured.
3.And to access contents of different directories we can use following cmd in terminal
aws s3 ls s3://s3://███/binaries/
aws s3 ls s3://s3://█████/repodata/
aws s3 ls s3://s3://█████████/repoview/
and in a similar way ,we can access content of root or any directory which contains sensitive manuals , document and media files
Suggested Mitigation/Remediation Actions :
configure s3 bucket properly to disable listing of such a sensitive files
## Impact
Any unauthenticated user can access and download sensitive files present on GoCD s3 storage.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic