CVE-2023-50928
📋 TL;DR
This vulnerability allows authenticated users to claim and access empty AWS accounts by sending malicious API requests with non-existent event IDs and self-defined parameters. It affects users of the 'Sandbox Accounts for Events' tool who haven't updated to version 1.1.0. Only cleaned AWS accounts are vulnerable, not accounts in use or with existing data.
💻 Affected Systems
- Sandbox Accounts for Events
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could claim multiple AWS accounts, potentially leading to resource consumption, unexpected costs, or using accounts for malicious activities within the sandbox environment.
Likely Case
Users bypass intended controls to claim AWS accounts without proper event association, potentially causing minor resource waste or administrative confusion.
If Mitigated
With proper access controls and monitoring, impact is limited to temporary account misuse that can be quickly detected and revoked.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of API endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.1.0
Vendor Advisory: https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-cg8w-7q5v-g32r
Restart Required: Yes
Instructions:
1. Update to version 1.1.0 or later. 2. Restart the application. 3. Verify the fix by testing API validation.
🔧 Temporary Workarounds
Restrict API Access
allImplement strict API access controls and input validation at network level
Monitor Account Claims
allImplement real-time monitoring for unusual account claiming patterns
🧯 If You Can't Patch
- Implement strict input validation for event IDs and budget parameters at API gateway level
- Monitor AWS account creation logs for unauthorized claims and implement automated revocation
🔍 How to Verify
Check if Vulnerable:
Check if running version before 1.1.0 and test API endpoint with invalid event IDs
Check Version:
Check application version in configuration or via version endpoint
Verify Fix Applied:
Test that API rejects requests with non-existent event IDs after updating to 1.1.0+
📡 Detection & Monitoring
Log Indicators:
- API requests with invalid/non-existent event IDs
- Unusual frequency of account claims
- Account claims with unusual budget/duration parameters
Network Indicators:
- Unusual patterns of POST requests to account API
- Requests bypassing normal GUI workflow
SIEM Query:
source="sandbox-accounts" AND (event_id="*invalid*" OR event_id="*nonexistent*")
🔗 References
- https://github.com/awslabs/sandbox-accounts-for-events/commit/f30a0662f0a28734eb33c5868cccc1c319eb6e79
- https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-cg8w-7q5v-g32r
- https://github.com/awslabs/sandbox-accounts-for-events/commit/f30a0662f0a28734eb33c5868cccc1c319eb6e79
- https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-cg8w-7q5v-g32r