Skip to content

Latest commit

 

History

History
105 lines (71 loc) · 6.13 KB

aws-stepfunctions-post-exploitation.md

File metadata and controls

105 lines (71 loc) · 6.13 KB

AWS - Step Functions Post Exploitation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Step Functions

For more information about this AWS service, check:

{% content-ref url="../aws-services/aws-stepfunctions-enum.md" %} aws-stepfunctions-enum.md {% endcontent-ref %}

states:RevealSecrets

This permission allows to reveal secret data inside an execution. For it, it's needed to set Inspection level to TRACE and the revealSecrets parameter to true.

states:DeleteStateMachine, states:DeleteStateMachineVersion, states:DeleteStateMachineAlias

An attacker with these permissions would be able to permanently delete state machines, their versions, and aliases. This can disrupt critical workflows, result in data loss, and require significant time to recover and restore the affected state machines. In addition, it would allow an attacker to cover the tracks used, disrupt forensic investigations, and potentially cripple operations by removing essential automation processes and state configurations.

{% hint style="info" %}

  • Deleting a state machine you also delete all its associated versions and aliases.
  • Deleting a state machine alias you do not delete the state machine versions referecing this alias.
  • It is not possible to delete a state machine version currently referenced by one o more aliases. {% endhint %}
# Delete state machine
aws stepfunctions delete-state-machine --state-machine-arn <value>
# Delete state machine version
aws stepfunctions delete-state-machine-version --state-machine-version-arn <value>
# Delete state machine alias
aws stepfunctions delete-state-machine-alias --state-machine-alias-arn <value>
  • Potential Impact: Disruption of critical workflows, data loss, and operational downtime.

states:UpdateMapRun

An attacker with this permission would be able to manipulate the Map Run failure configuration and parallel setting, being able to increase or decrease the maximum number of child workflow executions allowed, affecting directly and performance of the service. In addition, an attacker could tamper with the tolerated failure percentage and count, being able to decrease this value to 0 so every time an item fails, the whole map run would fail, affecting directly to the state machine execution and potentially disrupting critical workflows.

{% code overflow="wrap" %}

aws stepfunctions update-map-run --map-run-arn <value> [--max-concurrency <value>] [--tolerated-failure-percentage <value>] [--tolerated-failure-count <value>]

{% endcode %}

  • Potential Impact: Performance degradation, and disruption of critical workflows.

states:StopExecution

An attacker with this permission could be able to stop the execution of any state machine, disrupting ongoing workflows and processes. This could lead to incomplete transactions, halted business operations, and potential data corruption.

{% hint style="warning" %} This action is not supported by express state machines. {% endhint %}

{% code overflow="wrap" %}

aws stepfunctions stop-execution --execution-arn <value> [--error <value>] [--cause <value>]

{% endcode %}

  • Potential Impact: Disruption of ongoing workflows, operational downtime, and potential data corruption.

states:TagResource, states:UntagResource

An attacker could add, modify, or remove tags from Step Functions resources, disrupting your organization's cost allocation, resource tracking, and access control policies based on tags.

aws stepfunctions tag-resource --resource-arn <value> --tags Key=<key>,Value=<value>
aws stepfunctions untag-resource --resource-arn <value> --tag-keys <key>

Potential Impact: Disruption of cost allocation, resource tracking, and tag-based access control policies.

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}