We discovered a pattern in the way many projects retrieve Amazon Machine Images (AMIs), allowing attackers to publish AMIs with specially crafted names and gain code execution within vulnerable accounts.
https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/
by @sethsec.bsky.social
https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/
by @sethsec.bsky.social
Comments
https://github.com/DataDog/whoAMI-scanner