Skip to content

Commit 6ced657

Browse files
authored
Merge pull request #246 from HackTricks-wiki/update_Infiltrating_the_AWS_Console_Supply_Chain__Hijacki_20260116_124313
Infiltrating the AWS Console Supply Chain Hijacking Core AWS...
2 parents c716f0a + a41dc4c commit 6ced657

1 file changed

Lines changed: 17 additions & 0 deletions

File tree

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,6 +185,23 @@ aws codebuild start-build --project-name <proj-name>
185185
> [!WARNING]
186186
> Now an attacker will be able to use the token from his machine, list all the privileges it has and (ab)use easier than using the CodeBuild service directly.
187187
188+
## Webhook filter ACTOR_ID regex allowlist bypass (PR-triggered privileged builds)
189+
190+
Misconfigured CodeBuild GitHub webhooks that use unanchored `ACTOR_ID` regexes let *untrusted* PRs start privileged builds. If the allowlist is like `123456|7890123` without `^`/`$`, any ID containing one of those substrings matches. Because GitHub user IDs are sequential, an attacker can race to register an “eclipsing” ID (a superstring of a trusted ID) and trigger the build.
191+
192+
**Exploit path**
193+
194+
1. Find public CodeBuild projects exposing webhook filters and extract an unanchored `ACTOR_ID` allowlist.
195+
2. Obtain an eclipsing GitHub ID:
196+
- Sample the global ID counter by creating/deleting GitHub orgs (org IDs share the pool).
197+
- Pre-stage many GitHub App manifest creations and fire the confirmation URLs when the counter is within ~100 IDs of the target to burst-register a bot ID containing the trusted substring.
198+
3. Open a PR from the eclipsing account; the regex matches the substring and the privileged build runs.
199+
4. Use build RCE (e.g., dependency install hooks) to dump process memory handling the GitHub credential and recover the PAT/OAuth token.
200+
5. With the token’s `repo` scope, invite your account as collaborator/admin and push/approve malicious commits or exfiltrate secrets.
201+
202+
## References
203+
- [Wiz: CodeBreach – AWS CodeBuild ACTOR_ID regex bypass and token theft](https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild)
204+
188205
{{#include ../../../../banners/hacktricks-training.md}}
189206

190207

0 commit comments

Comments
 (0)