OpenID Connect (OIDC) - PrivEsc
Abusing default or poorly configured Identity Provider IAM Trust Policies for privilege escalation
What is OIDC?
OpenID Connect is an authentication protocol based on the OAuth 2.0 framework that eliminates the need for storing and managing passwords
Within AWS, an Identity Provider can be configured for OIDC ID Federation between AWS and the service
An IAM Role along with its Trust Policy and Permissions policy is created and tied to the Identity Provider
GitLab OIDC with AWS
GitLab and AWS can integrate via OIDC, allowing GitLab pipelines to authenticate and assume an IAM Role within AWS to manage or deploy resources securely
If the Role's Trust Policy is misconfigured (or otherwise poorly configured), any GitLab pipeline could authenticate to the AWS account (assuming the attacker has identified the AWS Account ID and IAM Role name), exposing its permissions to attackers
GitLab AWS IAM Role Misconfigured Trust Policy
This IAM Role Trust Policy allows any connection from GitLab.com
GitLab AWS IAM Role Secure Trust Policy
To resolve this, it's important to specify additional conditions in the IAM Role's Trust Policy e.g.,
This new Trust Policy only allows requests coming from the GitLab Group "Engineering" from the Project "AWS-Deployments" from the "main" branch
GitLab Exploiting the Misconfigured Trust Policy
CI/CD Variables are also needed for this to work. See my blog post here for setup.
GitHub Actions OIDC with AWS
GitHub and AWS can integrate via OIDC, allowing GitHub pipelines to authenticate and assume an IAM Role within AWS to manage or deploy resources securely
If the Role's Trust Policy is misconfigured (or otherwise poorly configured), any GitHub pipeline could authenticate to the AWS account (assuming the attacker has identified the AWS Account ID and IAM Role name), exposing its permissions to attackers
GitHub Actions AWS IAM Role Misconfigured Trust Policy
This IAM Role Trust Policy allows any connection from GitHub.com
GitHub Actions AWS IAM Role Secure Trust Policy
To resolve this, it's important to specify additional conditions in the IAM Role's Trust Policy e.g.,
GitHub Actions Exploiting the Misconfigured Trust Policy
Last updated