Discover how a security misconfiguration in "Sandbox Accounts for Events" by awslabs led to a CVE-2023-50928 vulnerability, allowing unauthorized access to AWS accounts. Learn about the impact, technical details, and mitigation steps.
A security misconfiguration in the "Sandbox Accounts for Events" software by awslabs has led to a vulnerability that could allow unauthorized access to temporary AWS accounts. Learn more about CVE-2023-50928 below.
Understanding CVE-2023-50928
This CVE identifies a security flaw in the "Sandbox Accounts for Events" application that allows authenticated users to access empty AWS accounts by manipulating request payloads.
What is CVE-2023-50928?
"Sandbox Accounts for Events" provides multiple, temporary AWS accounts to authenticated users via a browser-based GUI. Users can potentially claim and access empty AWS accounts by sending request payloads with non-existent event ids and self-defined budget & duration.
The Impact of CVE-2023-50928
This vulnerability could lead to unauthorized access to AWS accounts, although it only affects cleaned AWS accounts. It is not possible to access AWS accounts in use or existing data/infrastructure. The issue has been patched in version 1.1.0.
Technical Details of CVE-2023-50928
The vulnerability is classified as CWE-284 (Improper Access Control) with a CVSS v3.1 base score of 7.1 (High).
Vulnerability Description
The flaw in the software allows users to access empty AWS accounts through manipulated request payloads, leading to unauthorized account access.
Affected Systems and Versions
The affected software is "Sandbox Accounts for Events" by awslabs with versions prior to 1.1.0.
Exploitation Mechanism
Authenticated users can exploit this vulnerability by sending request payloads with non-existent event ids and custom budget & duration parameters.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-50928, immediate steps should be taken along with long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that all software and systems are regularly updated to the latest versions to patch known vulnerabilities.