![]() |
|
HackerOne Disclosed Reports - 2025-05-28 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2025-05-28 (/Thread-HackerOne-Disclosed-Reports-2025-05-28) |
HackerOne disclosed reports - 2025-05-28 - hashXploiter - 05-29-2025
Medium
resolved CVE-2025-5025: No QUIC certificate pinning with wolfSSLBug reported by Hiroki Kurosawa was disclosed at May 28, 2025, 6:35 am | Improper Certificate Validation
Medium
resolved CVE-2025-4947: QUIC certificate check skip with wolfSSLBug reported by Hiroki Kurosawa was disclosed at May 28, 2025, 6:35 am | Improper Validation of Certificate with Host Mismatch
Medium
resolved Non-Production API Endpoints for the bedrock-agent Service Fail to Log to CloudTrail Resulting in Silent Permission EnumerationBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:39 am | Insufficient Logging The non-production API endpoints for the bedrock-agent service failed to log to CloudTrail, resulting in silent permission enumeration. A total of 26 non-production endpoints were found that could be used with standard IAM credentials without generating CloudTrail logs. This vulnerability was considered a security issue by AWS, as it allowed for invisible enumeration of permissions.
Medium
resolved Non-Production API Endpoints for the bedrock Service Fail to Log to CloudTrail Resulting in Silent Permission EnumerationBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:38 am | Insufficient Logging The bedrock service was found to have 5 non-production API endpoints that could be used with standard IAM credentials to enumerate permissions without logging to CloudTrail. The impacted endpoints allowed the invocation of bedrock:ListImportedModels and bedrock:ListModelImportJobs actions. This vulnerability was reported to AWS, who considered it a security issue.
Medium
resolved Non-Production API Endpoint for the EventBridge Service Fails to Log to CloudTrail Resulting in Silent Permission EnumerationBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:35 am | Insufficient Logging The non-production API endpoint for the EventBridge service was found to fail to log to CloudTrail, resulting in silent permission enumeration. This vulnerability was reported to AWS, as it allowed for the enumeration of permissions of compromised credentials without generating CloudTrail logs, which could be used by adversaries to assess the access they have gained.
Medium
resolved Non-Production API Endpoints for the Global Accelerator Service Fail to Log to CloudTrail Resulting in Silent Permission EnumerationBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:34 am | Insufficient Logging The researchers discovered that there are 8 non-production endpoints for the Global Accelerator service which can be used with standard IAM credentials and do not log to CloudTrail. This allows for silent permission enumeration, where an adversary can determine the permissions of compromised credentials without generating any logs.
Medium
resolved Non-Production API Endpoints for the Health Service Fail to Log to CloudTrail Resulting in Silent Permission EnumerationBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:32 am | Insufficient Logging The AWS Health service was found to have 11 non-production API endpoints that could be accessed using standard IAM credentials without logging to CloudTrail. This allowed for silent permission enumeration, where an adversary could test the capabilities of compromised credentials without generating auditable CloudTrail logs.
Medium
resolved Amazon Pinpoint SMS and Voice, version 2 Service Reporting "AWS Internal" for CloudTrail Events Generated from FIPS EndpointsBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:30 am | Insufficient Logging The Amazon Pinpoint SMS and Voice, version 2 service was found to incorrectly report the user-agent and network information as "AWS Internal" for five specific API endpoints that are FIPS endpoints. This issue was discovered to be similar to a previous bug reported for the Comprehend Medical and Kendra services, suggesting a potential wider issue across a small number of services. As a result of this vulnerability, an adversary could have performed API calls using these endpoints and evaded the logging of their IP address and operating system information.
Medium
resolved Amazon Kendra Intelligent Ranking Service Reporting "AWS Internal" for CloudTrail Events Generated from FIPS EndpointsBug reported by Nick Frichette (Datadog) was disclosed at May 28, 2025, 12:24 am | Insufficient Logging The AWS Kendra Intelligent Ranking service was found to incorrectly report the user-agent and network information as "AWS Internal" for four API endpoints that are FIPS endpoints. This issue can lead to the obscuring of request information that may be used to track down an adversary. |