mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2025-12-12 07:40:49 -08:00
Update README to specify Airflow DAG permissions
Clarified that all Airflow DAGs run with the execution role's permissions.
This commit is contained in:
@@ -27,7 +27,7 @@ Documentation Verifying Vuln and Acknowledging Vectorr: [AWS Documentation](http
|
||||
|
||||
## Exploitation
|
||||
|
||||
All DAGs run with the execution role's permissions. DAGs are Python scripts that can execute arbitrary code - they can use `yum` or `curl` to install tools, download malicious scripts, or import any Python library. DAGs are pulled from an assigned S3 folder and run on schedule automatically, all an attacker needs is ability to PUT to that bucket path.
|
||||
All Airflow DAGs run with the execution role's permissions. DAGs are Python scripts that can execute arbitrary code - they can use `yum` or `curl` to install tools, download malicious scripts, or import any Python library. DAGs are pulled from an assigned S3 folder and run on schedule automatically, all an attacker needs is ability to PUT to that bucket path.
|
||||
|
||||
Anyone who can write DAGs (typically most users in MWAA environments) can abuse this permission:
|
||||
|
||||
|
||||
Reference in New Issue
Block a user