Case: CG-2024-00003 Hope: Exposed Credentials in Public Buckets
Case lead: Soufian El Yadmani
Researchers: Gabriel Tarsia, Michael Rowley, Sophia Guarnotta, Tyler Kay
CWE(s): CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE-522: Insufficiently Protected Credentials
Published: 15 April 2024 09:00 CET
Last updated: 19 Apr 2024
Public Buckets are exposed to the world at large. While they can be useful for things like websites and public data stores, it is unlikely that credentials will be intentionally placed here. During this case, we scanned large numbers of publicly exposed buckets from providers like:
for credentials like:
For some credential types (notably cloud provider access), the potential for abuse is high and can lead to further lateral movement and privilege escalation. Amazon have provided some detailed playbooks to tackle these situations: