-
Notifications
You must be signed in to change notification settings - Fork 179
False negative - lambda:UpdateFunctionCode & lambda:UpdateFunctionConfiguration #86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thank you for the report! Just a couple follow-up questions:
Additional context, here's the source code that is supposed to detect this type of Edge: https://github.com/nccgroup/PMapper/blob/v1.1.3-dev/principalmapper/graphing/lambda_edges.py#L139-L176 |
Found the issue, applied a fix in 05504a7 and verified it worked on my machine. This has affected all v1.1.X up until this point. Please try the latest release ( |
bugfixes: * NotPrincipal in resource policies, '*' for matching principals * Codebuild tag handling fixed * Querying with cached resource policies fixed for IAM Role Trust Policies * SQS messaging on missing queue policy fixed * Orgs messaging on improper args fixed * Orgs without SCPs fixed * fixed handling for condition contexts, case-insensitive keys * fix for #86 - Did not include Edges for existing Lambda functions additions: * updated output of (arg)query, changed edge descriptions to use node searchable-names * add endgame support for Secrets Manager Co-authored-by: Erik Steringer <erik.steringer@nccgroup.com>
Confirmed on my end. Nice work! |
Updated to include information about Quiet Riot
Brief Description
I can't get pmapper to trigger on
EditExistingLambdaFunctionWithRole
even though I have have verified the exploit path manually (simulator results pasted below).For additional context,
PassExistingRoleToNewLambdaThenInvoke
andPassRoleToNewLambdaThenTriggerWithNewDynamo
are both detected correctly!Side note: Pmapper is awesome! I love the recent improvements and the new detections!
IAM Action, Resource, and Condition Being Authorized & IAM Policies Attached to Principal
Here's the IAM policy attached to my caller principal:
This policy is attached to the role
arn:aws:iam::[ACCOUNT]:role/privesc17-EditExistingLambdaFunctionWithRole-role
.There is one lambda in the account, and that lambba has a high privileged role attached to it:
Lambda:
Here is the policy attached to
"Role": "arn:aws:iam::[ACCOUNT]:role/privesc-high-priv-lambda-role2"
Expected Behavior
This should be detected as a privesc, but it is not detected.
AWS IAM Policy Simulation Result
Simulator confirms it is allowed
The text was updated successfully, but these errors were encountered: