Skip to content

Commit ae16a5d

Browse files
mer-bkorniko98
andauthored
Create bedrock-models-iam-flaw (#411)
* Create bedrock-models-iam-flaw * Update bedrock-models-iam-flaw * Update bedrock-models-iam-flaw --------- Co-authored-by: Amitai Cohen <[email protected]>
1 parent 46eef59 commit ae16a5d

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
title: IAM Policy Flaw Allowed Unauthorized Access to Bedrock Models
2+
slug: bedrock-models-iam-flaw
3+
cves: null
4+
affectedPlatforms:
5+
- AWS
6+
affectedServices:
7+
- AWS Bedrock
8+
image: https://images.unsplash.com/photo-1697731054413-76d71c54f9c8?ixlib=rb-1.2.1&ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&auto=format&fit=crop&w=1173&q=80
9+
severity: High
10+
discoveredBy:
11+
name: Carlos Mora
12+
org: TrustOnCloud
13+
domain: trustoncloud.com
14+
twitter: null
15+
publishedAt: 2024/03/24
16+
disclosedAt: 2024/01/15
17+
exploitabilityPeriod: Until March 17th, 2024
18+
knownITWExploitation: false
19+
summary: |
20+
TrustOnCloud identified a flaw in how AWS Bedrock enforces IAM access controls using the aws-marketplace:ProductId condition key, which is meant to restrict subscriptions to specific foundation models. Their testing revealed that some Bedrock models, including those from Cohere and Stability AI, were not consistently blocked or allowed as intended by IAM policies, posing potential compliance and cost risks. AWS acknowledged and fixed the issue, notifying affected customers and updating testing procedures to prevent future issues.
21+
manualRemediation: |
22+
null
23+
detectionMethods: |
24+
null
25+
contributor: https://github.com/mer-b
26+
entryStatus: Finalized
27+
references:
28+
- https://trustoncloud.com/blog/exposing-the-weakness-how-we-identified-a-flaw-in-bedrocks-foundation-model-access-control/

0 commit comments

Comments
 (0)