From 3c5f3e9083f8d74cfdb3f7f74ead00f16b227298 Mon Sep 17 00:00:00 2001 From: adraelll <69719906+adraelll@users.noreply.github.com> Date: Sun, 4 Aug 2024 23:24:46 +0200 Subject: [PATCH] Add precision on who can assume a role with an AWS account as principal --- .../misconfigured_iam_role_trust_policy_wildcard_principal.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.md b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.md index 06975093e..767095c8e 100644 --- a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.md +++ b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_iam_role_trust_policy_wildcard_principal.md @@ -27,7 +27,7 @@ This policy typically looks like the following: } ``` -This policy would `Allow` anyone in the `111111111111` account the ability to perform the action `sts:AssumeRole` (assume the role). +This policy would `Allow` anyone in the `111111111111` account the ability to perform the action `sts:AssumeRole` (assume the role), provided that they have the action in their IAM identity-based policy. As mentioned in our documentation on [Misconfigured Resource Based Policies](https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/#the-principal-and-risks), there are a variety of options that can be used for the `Principal` element, including, AWS accounts, specific IAM roles, role sessions, IAM users, and AWS services. Arguably the most risky is the "wildcard" `Principal`. This `Principal` encompasses __ALL__ AWS principals.