AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking

March 22, 2024 at 10:03AM

Cybersecurity researchers detailed a security vulnerability in AWS Managed Workflows for Apache Airflow that’s now fixed by AWS, named FlowFixation by Tenable. It could allow a threat actor to hijack sessions, achieve code execution, and perform same-site attacks, impacting AWS, Azure, and Google Cloud. Both AWS and Azure have addressed the issue. Google Cloud has not deemed it severe enough.

Based on the meeting notes, here are the key takeaways:

1. Vulnerability in AWS Managed Workflows for Apache Airflow (MWAA): A security vulnerability in AWS MWAA, now patched, had the potential for session hijacking and remote code execution by a malicious actor.

2. Vulnerability Details: The vulnerability, named FlowFixation, was a result of a combination of session fixation and AWS domain misconfiguration, leading to cross-site scripting attacks.

3. Impact and Exploitation: Exploiting this vulnerability could result in unauthorized access, data leaks, code execution, and bypassing CSRF protection.

4. Broader Impact: The vulnerability has broader implications for cloud providers’ domain architecture and management, affecting not only AWS but also Microsoft Azure and Google Cloud.

5. Security Fixes: AWS and Azure have addressed the misconfigured domains by adding them to the Public Suffix List (PSL), while Google Cloud has not considered it severe enough to merit a fix.

6. Recommendations: Addressing the broader issue of shared architecture and domain misconfigurations is crucial to mitigating same-site attacks and related vulnerabilities in cloud environments.

Let me know if you need further information or analysis on this topic.

Full Article