AWS S3 Bucket Misconfiguration
Last updated
Was this helpful?
Last updated
Was this helpful?
An Amazon s3 (Simple Storage Service) is a service from AWS (Amazon Web Services) which is like cloud storage used to store a file, folders, objects, etc. It is used mostly to store images, videos, PDFS, text files, and in rare cases to store source backups, credentials in plain text, etc.
AWS S3 Bucket Misconfiguration which allows the attacker to get the full anonymous access to your files and it lead to loss of reputation,loss of integrity and confidentiality.
These can be done manually or by using some automated scripts as follows:
1.Suppose you are hunting on a target, you can use dnsdumpster to find out all the subdomains, it also finds out the s3buckets, which will look like
2.You can find the buckets if you intercept the requests of Uploading a profile picture or etc.
3.Also always try to download the files , and if you use mozilla it prompts an option to “save” or “openwith” which shows the address where the url from where the files are being downloaded.This can reveal buckets.
The main reason is improper file permissions, changing the permissions properly would fix such issue.
Review the bucket ACLs to verify that the WRITE and WRITE_ACP are only set on specific users, never on groups such as AllUsers or AuthenticatedUsers.
Take a look and see how you are uploading objects to S3 buckets and make sure you set the proper ACLs on both buckets and objects.
Note: Newly created Amazon S3 buckets and objects are private and protected by default.