Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: S3 ACL analysis rule for WRITE permissions never triggers #1244

Merged
merged 4 commits into from
Sep 22, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions cartography/data/jobs/analysis/aws_s3acl_analysis.json
Original file line number Diff line number Diff line change
@@ -1,22 +1,27 @@
{
"statements": [
{
"__comment__": "READ -> ListBucket, ListBucketVersions, ListBucketMultipartUploads",
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'READ'\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:ListBucket', 's3:ListBucketVersions', 's3:ListBucketMultipartUploads']",
"iterative": false
},
{
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'WRITE'\nAND (acl.ownerid = acl.granteeid)\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:DeleteObjectVersion']",
"__comment__": "WRITE -> PutObject",
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'WRITE'\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:PutObject']",
"iterative": false
},
{
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'READ_ACP'\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:DeleteObjectVersion']",
"__comment__": "READ_ACP -> GetBucketAcl",
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'READ_ACP'\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:GetBucketAcl']",
"iterative": false
},
{
"__comment__": "WRITE_ACP -> PutBucketAcl",
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'WRITE_ACP'\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:PutBucketAcl']",
"iterative": false
},
{
"__comment__": "FULL_CONTROL -> Pretty much everything",
"query": "MATCH (acl:S3Acl)-[:APPLIES_TO]->(bucket:S3Bucket)<-[:RESOURCE]-(aws:AWSAccount{id: $AWS_ID})\nWHERE acl.uri IN ['http://acs.amazonaws.com/groups/global/AllUsers', 'http://acs.amazonaws.com/groups/global/AuthenticatedUsers'] AND acl.permission = 'FULL_CONTROL'\nSET bucket.anonymous_access = true, bucket.anonymous_actions = coalesce(bucket.anonymous_actions, []) + ['s3:ListBucket', 's3:ListBucketVersions', 's3:ListBucketMultipartUploads', 's3:PutObject', 's3:DeleteObject', 's3:DeleteObjectVersion', 's3:PutBucketAcl']",
"iterative": false
}],
Expand Down
7 changes: 6 additions & 1 deletion cartography/intel/aws/s3.py
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,12 @@ def _is_common_exception(e: Exception, bucket: Dict) -> bool:


@timeit
def _load_s3_acls(neo4j_session: neo4j.Session, acls: Dict, aws_account_id: str, update_tag: int) -> None:
def _load_s3_acls(
neo4j_session: neo4j.Session,
acls: List[Dict[str, Any]],
aws_account_id: str,
update_tag: int,
) -> None:
"""
Ingest S3 ACL into neo4j.
"""
Expand Down
63 changes: 63 additions & 0 deletions tests/data/aws/s3.py
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,69 @@
},
}

OPEN_BUCKET_ACLS = {
"bucket-1": {
"Owner": {
"DisplayName": "my-display-name-1",
"ID": "3cb8",
},
"Grants": [
{
"Grantee": {
"DisplayName": "my-display-name-1",
"ID": "3cb8",
"Type": "CanonicalUser",
},
"Permission": "FULL_CONTROL",
},
],
},
"bucket-2": {
"Owner": {
"DisplayName": "my-display-name-2",
"ID": "828a",
},
"Grants": [
{
"Grantee": {
"Type": "Group",
"URI": "http://acs.amazonaws.com/groups/global/AllUsers",
},
"Permission": "READ",
},
{
"Grantee": {
"Type": "Group",
"URI": "http://acs.amazonaws.com/groups/global/AuthenticatedUsers",
},
"Permission": "READ_ACP",
},
],
},
"bucket-3": {
"Owner": {
"DisplayName": "my-display-name-2",
"ID": "828a",
},
"Grants": [
{
"Grantee": {
"Type": "Group",
"URI": "http://acs.amazonaws.com/groups/global/AllUsers",
},
"Permission": "WRITE_ACP",
},
{
"Grantee": {
"Type": "Group",
"URI": "http://acs.amazonaws.com/groups/global/AuthenticatedUsers",
},
"Permission": "WRITE",
},
],
},
}

GET_ENCRYPTION = {
'bucket': 'bucket-1',
'default_encryption': True,
Expand Down
51 changes: 51 additions & 0 deletions tests/integration/cartography/intel/aws/test_s3_acls.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
from cartography.intel.aws.s3 import _load_s3_acls
from cartography.intel.aws.s3 import load_s3_buckets
from cartography.intel.aws.s3 import parse_acl
from tests.data.aws.s3 import LIST_BUCKETS
from tests.data.aws.s3 import OPEN_BUCKET_ACLS
from tests.integration.cartography.intel.aws.iam.test_iam import _create_base_account
from tests.integration.util import check_nodes

TEST_ACCOUNT_ID = '000000000000'
TEST_REGION = 'us-east-1'
TEST_UPDATE_TAG = 123456789


def test_load_s3_acls(neo4j_session):
"""
Ensure that the S3 ACL that sets anonymous_access and anonymous_actions works.
"""
# Arrange: hackily add s3 data to the test graph
_create_base_account(neo4j_session)
load_s3_buckets(neo4j_session, LIST_BUCKETS, TEST_ACCOUNT_ID, TEST_UPDATE_TAG)
parsed_acls = []
for bucket_name, acl in OPEN_BUCKET_ACLS.items():
acl = parse_acl(acl, bucket_name, TEST_ACCOUNT_ID)
if acl:
parsed_acls.extend(acl)

# Act: run the analysis job
_load_s3_acls(neo4j_session, parsed_acls, TEST_ACCOUNT_ID, TEST_UPDATE_TAG)

# Assert that the anonymous_access field is set as expected
assert check_nodes(neo4j_session, 'S3Bucket', ['name', 'anonymous_access']) == {
('bucket-1', None),
('bucket-3', True),
('bucket-2', True),
}

# Assert that we properly set anonymous_actions on the S3Bucket based on the attached S3Acls
# (Can't use check_nodes() here because anonymous_actions is a list and is non-hashable.)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

non-blocker: A few weeks ago we had a _check_nodes_as_list in the semgrep test. We could refactor it into tests.integraton.util
https://github.com/lyft/cartography/blob/ef5cbcede534d91df74d2e497cc2958ae548271e/tests/integration/cartography/intel/semgrep/test_findings.py#L19

actual = neo4j_session.run(
"""
MATCH (r:S3Bucket) RETURN r.name, r.anonymous_actions;
""",
)
actual_nodes = [
(n['r.name'], sorted(n['r.anonymous_actions']) if n['r.anonymous_actions'] else []) for n in actual
]
assert sorted(actual_nodes) == [
('bucket-1', []),
('bucket-2', ['s3:GetBucketAcl', 's3:ListBucket', 's3:ListBucketMultipartUploads', 's3:ListBucketVersions']),
('bucket-3', ['s3:PutBucketAcl', 's3:PutObject']),
]