AWS Console Supply Chain Vulnerability Exposes GitHub Repositories

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

Wiz researchers disclosed a supply chain vulnerability in AWS Console CodeBuild that allowed attackers to hijack GitHub repositories and inject malicious code. The flaw stemmed from unanchored regular expressions in webhook filters for the ACTOR_ID parameter, which should have restricted builds to trusted GitHub user IDs. Attackers could exploit “eclipse events,” where new GitHub user IDs contained substrings of trusted IDs, to bypass filters. Four AWS repositories were affected: aws/aws-sdk-js-v3, aws/aws-lc, corretto/amazon-corretto-crypto-provider, and awslabs/open-data-registry. In a proof-of-concept, the researchers showed that a stolen GitHub Personal Access Token (PAT) could allow repo admin escalation and unauthorized main branch pushes, risking propagation of malicious code into AWS SDK releases and potentially affecting the AWS Console and associated cloud environments.

Who is affected

Organizations using affected AWS SDKs or managing enterprise workloads through AWS Console are indirectly exposed. Any environment incorporating the compromised SDKs or dependent on affected repositories faced potential risk, although AWS logs indicate no exploitation occurred.

Why CISOs should care

Supply chain vulnerabilities in widely used cloud platforms can result in cascading impacts across hundreds of thousands of enterprise cloud environments, creating opportunities for code injection, privilege escalation, and exposure of sensitive credentials.

3 practical actions

  • Review CI/CD security: Audit AWS CodeBuild configurations, webhook filters, and PAT scopes to prevent untrusted build execution.
  • Harden repository access: Limit GitHub PAT privileges and enable multi-factor authentication for repository maintenance accounts.
  • Monitor SDK usage and updates: Ensure all production environments are using verified, updated AWS SDK versions and track for unusual pull requests or unauthorized code changes.