Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » AWS patches critical “FlowFixation” vulnerability in Airflow service to prevent session hijacking
    Cyber Security

    AWS patches critical “FlowFixation” vulnerability in Airflow service to prevent session hijacking

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 22, 2024Editorial DepartmentAmazon Web Services/Vulnerabilities

    session hijacking

    Cybersecurity researchers have shared details of a now-patched security flaw in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could allow malicious actors to hijack a victim’s session and perform Implement remote code execution on the instance.

    The vulnerability has now been addressed by AWS, codenamed flow fixed Provided by Tenable.

    Senior security researcher Liv Matan said in a technical analysis: “After taking over the victim’s account, the attacker may perform tasks such as reading connection strings, adding configurations and triggering directed acyclic graphs (DAGS).”

    “In some cases, such behavior may result in RCE on the MWAA base instance and lateral movement to other services.”

    Internet security

    According to the cybersecurity firm, the root cause of the vulnerability is a combination of session fixation on the AWS MWAA web management panel and an AWS domain configuration misconfiguration, leading to a cross-site scripting (XSS) attack.

    Session fixation is a network attack technique that occurs when a user authenticates with a service without invalidating any existing session identifiers. This allows an attacker to force (also known as pinning) a session identifier known to the user so that once the user authenticates, the attacker can access the authenticated session.

    session hijacking

    By exploiting this flaw, a threat actor could force a victim to use and authenticate a known session of the attacker, and ultimately take over the victim’s web admin panel.

    “FlowFixation highlights a broader issue with the current state of cloud provider domain architecture and management as it relates to Public Suffix Lists (PSLs) and shared parent domains: same-site attacks,” Matan said, adding that misconfigurations can also impact Microsoft Azure and Google Cloud.

    Tenable also noted that shared architectures (where multiple customers have the same parent domain) can be a gold mine for attackers to exploit vulnerabilities such as same-site attacks, cross-origin issues, and cookie throwing, effectively leading to unauthorized access, data and data leakage. Leakage and code execution.

    Internet security

    AWS and Azure addressed this flaw by adding a misconfigured domain to the PSL, causing web browsers to recognize the added domain as a public suffix. Google Cloud, on the other hand, described the issue as “not serious enough” to be worth fixing.

    “In the case of same-site attacks, the security impact of the above domain architecture is significant, and the risk of such attacks is higher in cloud environments,” Matan explained.

    “Of these, cookie-tossing attacks and same-site attribute cookie protection bypasses are particularly concerning because both can bypass CSRF protection. Cookie-tossing attacks can also abuse session fixation issues.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.