Skip to content

[ISSUE] Vulnerability GO-2022-0646 in AWS SDK Go  #1371

@drodriguez-305

Description

@drodriguez-305

Describe the issue:
We have identified a security vulnerability, referenced as GO-2022-0646, in our project that uses the AWS SDK for Go. This vulnerability arises from using the V1 EncryptionClient, specifically with AES-CBC content cipher or the KMS key wrap algorithm. An attacker with write access to an S3 bucket could potentially decrypt files in that bucket.

It can only be triggered, though, if a particular, deprecated function is called. We would need to confirm this.

How to reproduce:

github.com/aws/aws-sdk-go v1.44.122 // indirect

Possible Solutions/Workarounds:

  • Migrating from the V1 EncryptionClient to the V1 EncryptionClientV2 API in AWS SDK for Go as recommended.
  • Assessing the feasibility of updating our project to use AWS SDK for Go v2, which may offer more robust security features and is not affected by this vulnerability.
  • Confirm its a false positive by ensuring the deprecated function is not called.

Useful Links:

Environment:

Please note: Without the following info, it's hard to resolve the issue and probably it will be closed.

  • AWS SDK for Go version: 1.44.122
  • Platform:
  • Helm CLI version:
  • Chart version:
  • Values file:

Metadata

Metadata

Labels

area/securityMarks an issue as improving security of the projectkind/issueUnidentified issue, it could be a bug, misconfig, or anything in betweenpossibly-outdatedFor github issues over a year old

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions