Add Security Test for Shadow Resource Vulnerability (Bucket Monopoly) #6701
Labels
feature-request
New feature request for Prowler.
provider/aws
Issues/PRs related with the AWS provider
New feature motivation
Prowler has been an invaluable tool for AWS security assessments. However, a recently identified vulnerability,
referred to as "Bucket Monopoly" highlights the risk of AWS shadow resources being exploited to breach accounts.
This vulnerability occurs when attackers claim predictably named resources—automatically generated by AWS services—in multiple regions before legitimate users, bypassing typical security controls.
Adding specific checks for shadow resource misuse will enhance Prowler's ability to detect and mitigate this critical threat, further securing AWS environments.
Problem Statement:
Shadow resources are assets created automatically by AWS services, often following predictable naming patterns. Examples include:
An attacker can exploit this predictability to create these resources across regions before the legitimate user, enabling malicious actions such as:
- Denial of Service (DoS): Blocking legitimate resource creation.
- Information Disclosure: Extracting sensitive data from victim services.
- Remote Code Execution (RCE): Injecting malicious payloads.
Solution Proposed
To address this vulnerability, the following actions can be implemented as a new security test in Prowler:
Describe alternatives you've considered
Unused Bucket Detection:
Identify available S3 bucket names that match predictable AWS service patterns but are not owned by the account.
Protection Assessment Metric:
Provide a protection percentage score based on the account's current resource ownership, offering a quick overview of vulnerability exposure.
Additional context
The vulnerability was extensively documented in Aqua Security's blog:
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources.
By implementing this feature, Prowler can better protect AWS accounts from emerging threats related to shadow resources, enhancing its position as a leading AWS security assessment tool.
If the maintainers find this proposal beneficial, I am interested in contributing to the development of this feature. Please advise on the next steps or any specific requirements.
The text was updated successfully, but these errors were encountered: