Vulnerability DatabaseGHSA-76wf-9vgp-pj7w

GHSA-76wf-9vgp-pj7w
vulnerability analysis and mitigation

Overview

The AWS S3 Crypto SDK for golang (github.com/aws/aws-sdk-go/service/s3/s3crypto) was affected by a vulnerability discovered in August 2020 that could result in loss of confidentiality. The vulnerability, tracked as GHSA-76wf-9vgp-pj7w, affected versions prior to 1.34.0 of the SDK. The issue allowed attackers with read access to an encrypted S3 bucket to potentially recover plaintext data without accessing the encryption key (Google Security Research).

Technical details

The vulnerability stemmed from the S3 crypto library storing an unencrypted MD5 hash of the plaintext alongside the ciphertext as a metadata field. This hash was exposed through the X-Amz-Meta-X-Amz-Unencrypted-Content-Md5 header, which could be used to conduct offline brute force attacks against the plaintext data. The attack was particularly effective against short plaintexts or when the attacker had access to create rainbow tables (Google Security Research).

Impact

The vulnerability posed insider risks and privilege escalation concerns by potentially circumventing KMS controls for stored data. The attack was theoretically valid when the plaintext entropy was below the key size, making it easier to brute force the plaintext instead of the key itself. The vulnerability was particularly impactful for short plaintexts or scenarios where attackers could access data to create rainbow tables (Google Security Research).

Mitigation and workarounds

AWS fully mitigated the issue on August 5th, 2020 by blocking the vulnerable metadata field server-side. Additionally, the vulnerability was patched in version 1.34.0 of the AWS SDK for Go. The fix ensures that no S3 objects are affected anymore as the hash has been removed from being calculated (Google Security Research, Go Vulnerability).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management