Błąd w regexie w AWS – jak dwa znaki mogły zagrozić chmurze?

Ile warte są dwa znaki w regexie? W tym przypadku: potencjalnie – spokój wszystkich użytkowników AWS.

Czytaj dalej:
https://pressmind.org/blad-w-regexie-w-aws-jak-dwa-znaki-mogly-zagrozic-chmurze/

#PressMindLabs #awscodebuild #awssdkforjavascript #codebreach #github #lancuchdostawcicd

CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild.
tldr: reason: a bad regex!
https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild?s=09
#vulnerability #aws #codebreach
CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog

Wiz Research discovered CodeBreach, a critical vulnerability that risked the AWS Console supply chain. Learn how to secure your AWS CodeBuild pipelines.

wiz.io

📢⚠️ An AWS supply chain flaw dubbed #CodeBreach nearly gave attackers full control of the AWS Console, thanks to a two-character bug in a regular expression (regex) filter.

Read: https://hackread.com/how-2-missing-chars-compromised-aws/

#Cybersecurity #AWS #Vulnerability #SupplyChain #CloudSecurity

How 2 Missing Characters Nearly Compromised AWS

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

A #codebreach in #AWS JavaScript SDK, a core library within the AWScloud ecosystem..

https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild